0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:03:47 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000040)=0xffffff0c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) recvmmsg(r1, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:03:47 executing program 3: 16:03:47 executing program 0: 16:03:47 executing program 4: write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000000c0)={r2}) 16:03:47 executing program 5: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:03:47 executing program 3: 16:03:52 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:03:52 executing program 0: 16:03:52 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, 0x0, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:03:52 executing program 3: 16:03:52 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') 16:03:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000003017fff808fdb003d88c8f00018ee1ba1d7bfb57f47ec00b67a467d17f89d52f4ec0b6101d2850c1e05a64ae4833b3accfb4bd24b1352b0707e16576392e6cb38e5609cf111171a60687229aed66ba28dba358335f479e83d5f9a9193588530be89372ff378280dcec2efaee5be64e4ce95c17536f7a58453a85a84f46c46a76249f27ea55322e43c1387c0aeb90602d9fe11ec05213dafed266cd6363e29ddb4049106cb1976365999c5f68c28168f9185751cac1e3b61111dba702003564b39c09ab41bb1999b356ff7fa1a7e3544c00cca81de66d7e81ac13ef7004d7f722c1bbd246c5f2d1a746c567be123924fed02de3bc8d165d12cfbc6e94ba751639d80f40a79fd120e1cbe98dd6abf3dde7814ca4358d59a50ec3cd22d086a50b5aa0ebed38bbb8833c2f40dff661b81f2816db86060c85022f25acb3ccd84bf3f7ef40be2ffec03bb645531c2cb3ab80e3024e197183fd345950837a64631ab587b34bd3b11388fc7d8f4a0f2651b6c130829078a8bdee9"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x97) setreuid(0x0, r2) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000280)=@v3={0x3000000, [{0x7, 0x6}, {0x1000, 0x8000}], r2}, 0x18, 0x2) 16:03:52 executing program 3: 16:03:52 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:03:52 executing program 0: [ 1168.216338][T20568] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:03:52 executing program 3: 16:03:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) clock_gettime(0x0, &(0x7f0000000b80)) recvmmsg(r0, &(0x7f0000000b00)=[{{&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0xfffffffffffffd9e, &(0x7f0000000040)=[{&(0x7f0000000140)=""/219, 0xdb}, {&(0x7f0000000240)=""/224, 0xe0}, {&(0x7f0000000340)=""/102, 0x66}], 0x5a}, 0x1000}, {{&(0x7f00000003c0)=@rc, 0x80, &(0x7f0000000640)=[{&(0x7f0000000440)=""/183, 0xb7}, {&(0x7f0000000500)=""/44, 0x13}, {&(0x7f0000000540)=""/184, 0x3f8}, {&(0x7f0000000c80)=""/209, 0xd1}, {&(0x7f0000000600)=""/40, 0x28}, {&(0x7f0000000900)=""/234, 0x44f}], 0x6, &(0x7f0000000a00)=""/252, 0xfc}, 0xffffffff}], 0x2, 0x200002, &(0x7f0000000c40)) getegid() 16:03:52 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:03:52 executing program 0: 16:03:52 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, 0x0, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:03:52 executing program 3: 16:03:53 executing program 0: 16:04:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x6, 0x7fff, 0x3, 0x100, 0x3ff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) prctl$PR_GET_SECUREBITS(0x1b) ioctl$EVIOCGREP(r1, 0x4010744d, &(0x7f0000000040)=""/174) 16:04:00 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:04:00 executing program 3: 16:04:00 executing program 0: 16:04:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1400000003017fff808fdb003d88c8f00018ee1ba1d7bfb57f47ec00b67a467d17f89d52f4ec0b6101d2850c1e05a64ae4833b3accfb4bd24b1352b0707e16576392e6cb38e5609cf111171a60687229aed66ba28dba358335f479e83d5f9a9193588530372ff378280dcec2efaee5be64e4ce95c17536f7a58453a85a84f46c46a76249f27ea55322e43c1387213dafed266cd6363e29ddb4049106cb1976365999c5f68c28168f9185751cac1e3b61111dba702003564b39c09ab41bb1999b356ff7fa1a7e3544c00cca81de66d7e81ac13ef7004d7f722c1bbd246c5f2d1a746c567be123924fed02de3bc8d165d12cfbc6e94ba751639d80f40a79fd120e1cbe98dd6abf3dde7814ca4358d59a50ec3cd22d086a50b5aa0ebed38bbb8833c2f40dff661b81f2816db86060c85022f25acb"], 0x133}}, 0x0) clock_gettime(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000013c0), 0x0, 0x0, &(0x7f0000000c40)={r1, r2+30000000}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000000c0)={0x100000001, 0x0, 0x2, r4}) splice(0xffffffffffffffff, &(0x7f0000000040)=0x1, r5, &(0x7f0000000100)=0x100000000, 0x4, 0x4) 16:04:00 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, 0x0, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:04:00 executing program 0: 16:04:00 executing program 3: 16:04:01 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:04:01 executing program 0: 16:04:01 executing program 3: 16:04:01 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:04:09 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000140), &(0x7f0000000180)=0xc) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) r2 = getpid() sched_setattr(r2, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4, 0x1, 0x8, 0x5, 0x0, 0x6, 0x200, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x7ff}, 0x920, 0x800, 0x5, 0x8, 0x81, 0x0, 0x2}, r2, 0x8, r3, 0x9) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 16:04:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="1400000003017fff808fdb003d88c8f00018ee1ba1d7bfb57f47ec00b67a467d17f89d52f4ec0b6101d2850c1e05a64ae4833b3ae4fb4bd24b1352b0707e16add692e6cb38e5609cf111171a60687229aed66ba28dba3583010001003d5f9a9193588530372ff378280dcec2efaee5be64e4ce95c17536f7a58453a85a84f4f16c46a76249f27ea55322e43c1387213dafed266cd6363e29ddb4049106cb1976365999c5f68c28168f9185751cac1e3b61111dba702003564b39c09ab41bb1999b356ff7fa004d7f722c1bbd246c5f2d1a746c567be123924fed02de3bc8d165d12cfbc6e94ba751639d80f40a79fd120e1cbe98dd072cd093af5e7b6e97112b603c64f66abf3dde7814ca4358d59a50ec3cd22d086a50b5aa0ebed38bbb8833c2f40d00000000000000000000000000000000fcda846131dc942a8fe18b7b2ed96d1b5454389ae28afa81a0a05a3b960507c16050a7a6b37c83"], 0xa}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) r1 = msgget(0x3, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r2, 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000800)='security.selinux\x00', &(0x7f0000000840)='system_u:object_r:tzdata_exec_t:s0\x00', 0x64f94da775b01e85, 0x1) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x7, 0x4, 0x498, 0x130, 0x270, 0x0, 0x3b0, 0x3b0, 0x3b0, 0x4, &(0x7f0000000180), {[{{@arp={@dev={0xac, 0x14, 0x14, 0x19}, @broadcast, 0xffffffff, 0x7f, @empty, {[0xff, 0x0, 0x1fe, 0xff, 0x1fe]}, @mac, {[0x0, 0x101, 0xff, 0xff, 0xff]}, 0x3ff, 0x9, 0x5, 0x4, 0x7ff, 0x81, 'ip6_vti0\x00', 'veth0_to_bond\x00', {}, {}, 0x0, 0x5a}, 0xf0, 0x130}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x81, 0x0, 0x9}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast, @dev={0xac, 0x14, 0x14, 0x1e}, @remote, 0x8}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0x0, @empty, {[0x101, 0x0, 0x0, 0xff, 0xff, 0xff]}, @empty, {[0x0, 0x0, 0x727e5a93e69cf130, 0xff, 0xff, 0xff]}, 0xffff, 0x5, 0x0, 0xfbff, 0x5, 0x2, 'team_slave_0\x00', 'tunl0\x00', {}, {}, 0x0, 0x1}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={[], 0xf}, @empty, @multicast2, @multicast2, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4e8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) fallocate(r3, 0x26, 0x9, 0x3ff) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/139) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x4, 0x0, 0x5}}, 0x28) 16:04:09 executing program 0: 16:04:09 executing program 3: 16:04:09 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:04:09 executing program 4: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000000c0)={r2}) 16:04:09 executing program 3: 16:04:09 executing program 0: [ 1185.076202][T20943] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:09 executing program 4: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000000c0)={r2}) 16:04:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 16:04:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, 0x0, &(0x7f0000000400)) r0 = open(&(0x7f0000000600)='./file0\x00', 0xde93f32b121dff79, 0x0) writev(r0, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000700)='{', 0x1}, {0x0}], 0x3) 16:04:09 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1185.421682][T20967] sctp: [Deprecated]: syz-executor.0 (pid 20967) Use of int in maxseg socket option. [ 1185.421682][T20967] Use struct sctp_assoc_value instead [ 1185.578812][T20971] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:16 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x440000, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f00000000c0)={0x0, 0x5}) write(r1, &(0x7f0000000200), 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$USBDEVFS_RESETEP(r3, 0x80045503, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000040)={0x1, 0x0, {0x5, 0xa4, 0x7, 0xffffff52}}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r4, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r4, 0x0) ioctl$EVIOCGREP(r4, 0x4010744d, &(0x7f0000001000)=""/174) 16:04:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x3}) ioctl$KVM_RUN(r2, 0x8138ae83, 0x0) 16:04:16 executing program 4: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000000c0)={r2}) 16:04:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000100)}, {0x0}], 0x3}, 0x0) 16:04:16 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:04:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) recvmmsg(r1, &(0x7f00000013c0), 0x0, 0x200002, &(0x7f0000000c40)) bind$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r3, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x4000010, r3, 0xffffc000) splice(r2, &(0x7f0000000040)=0xf849, r3, &(0x7f0000000140)=0xce4, 0x100000000, 0x9) r4 = socket$inet(0x2, 0x805, 0x2) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000880)) 16:04:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) writev(r3, &(0x7f0000000340), 0x1) r4 = socket$netlink(0x10, 0x3, 0x200000000000004) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000080)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) r5 = socket$netlink(0x10, 0x3, 0x200000000000004) writev(r5, &(0x7f0000000040)=[{&(0x7f0000000080)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed", 0x40}], 0x1) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200080, 0x0) poll(&(0x7f0000000240)=[{r1, 0x80}, {r2}, {r4, 0x400}, {r1}, {r5}], 0x5, 0x5) 16:04:16 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) [ 1192.533047][T20988] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:17 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:04:17 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r2, 0x0, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES16]]) write$P9_RREADDIR(r0, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r0, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r5, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:04:17 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:04:17 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1193.037923][T21118] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1193.237141][T21121] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1193.266807][T21121] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:04:26 executing program 0: futex(0x0, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:04:26 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:04:26 executing program 3: futex(0x0, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:04:26 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r2, 0x0, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES16]]) write$P9_RREADDIR(r0, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r0, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r5, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:04:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x121) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f00000000c0)) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1400000003017fff808fdb003d88c8f00018ee1ba1d7bfb57f47ec00b67a467d17f89d52f4ec0b6101d2850c1e05a64ae4833b3accfb4bd24b1352b0707e16576392e6cb38e5609cf111171a60687229aed66ba28dba358335f479e83d5f9a9193588530372ff378280dcec2efaee5be64e4ce95c17536f7a58453a85a84f46c46a76249f27ea55322e43c1387213dafed266cd6363e29ddb4049106cb1976365999c5f68c28168f9185751cac1e3b61111dba702003564b39c09ab41bb1999b356ff7fa1a7e3544c00cca81de66d7e81ac13ef7004d7f722c1bbd246c5f2d1a746c567be123924fed02de3bc8d165d12cfbc6e94ba751639d80f40a79fd120e1cbe98dd6abf3dde7814ca4358d59a50ec3cd22d086a50b5aa0ebed38bbb8833c2f40dff661b81f2816db86060c85022f25acb"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:04:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r1, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000240)) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f0000000180)=0x4) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r4, 0x800442d3, &(0x7f0000000200)={0x0, 0x0, 0x96f, @broadcast, 'yam0\x00'}) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) fsetxattr$trusted_overlay_nlink(r2, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U+', 0x6}, 0x28, 0x3) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000040)=""/91) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) [ 1201.912199][T21244] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1201.932114][T21244] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1201.939067][T21238] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 16:04:26 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:04:26 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r2, 0x0, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES16]]) write$P9_RREADDIR(r0, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r0, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r5, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) [ 1201.973738][T21238] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:04:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0xe, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[], 0x94f2f695c7fe09a2}, 0x1, 0x0, 0x0, 0x24048880}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x21, &(0x7f00000000c0)="774d8c0c093bb25904f6170f63ff7eb39f819423f0833b4741c7e4faa3506cbb74802b8ec11240f598b18c79f8e8395f55f27c0b53f10b88aec259e512f0e92f12963de3afd7c3d82dded6776c5acea74ccc5a2cab21ebec188c58c493856b709d446f3642255b34e5523a559de0069f40a0e392d5b072a048b40cdf5619d8bb89336a2519acc3a8071939ac8a35c02db6655d6c851110a422e56778d73413a862662d97e4df61284898d62f440782e7dc2f0085326bd887b1c92097a52b0e4ea538fef1107e6ce4e37bac2270c4839312f9dd65ac6c8db066485b5cab", 0xdd) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r2, 0x0) r3 = openat(r2, &(0x7f0000000040)='./file0\x00', 0x38000, 0x10) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0), 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) 16:04:26 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r2}) 16:04:26 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) [ 1202.209757][T21357] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:26 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r2, 0x0, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES16]]) write$P9_RREADDIR(r0, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r0, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r5, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:04:26 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:04:26 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r2, 0x0, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES16]]) write$P9_RREADDIR(r0, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r0, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r5, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) [ 1202.529545][T21380] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:27 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1202.661757][T21381] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1202.691192][T21382] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1202.701270][T21381] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1202.725094][T21382] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:04:27 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r2, 0x0, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES16]]) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r5, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) [ 1202.792704][T21386] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:27 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1203.042559][T21399] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1203.071692][T21394] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1203.085658][T21394] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:04:35 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f0000000580)="4376578ccf48440de221db8cac99ec5f06640c03976ac09b79e5cc87e2293d6f5a8c9e2de76e1f59232183176144b5956d8da6fd11fb533b9c7951d7612ccca69bb266ca61c0609594887cbad475b1c201566db37d2cc4d7b025132fba6cc48dda8a06be155dbb8a0886495a4bb4e29eb99465c26b1d295113e0d42b31a388a72d820b813ab53bd97552eb53f47aeb72689b4e0a502a104a9b3f9ec818956cbcd7ed3547cea5eb93c9b9cc7930b59c2f02caa98f1b"}, {&(0x7f0000000640)="b322476238b4eede7b326a36682db5b4018a79869b0b901a0f37a8beb1cb118fd990d8421277490aaee18f874cc76944701214ce17d88de835637124fddf255dc95c2336dd2daa98fd582a9674e2c46c562b1771a355ba3c3d4215e6c796f9d1ff25a032e931b2cee594dd063361143ba5b0bd83e4a307b10312712fac2459245e9c06f829606c0ba796a490f548a145eea9dcade208e2301fa9c798f0321b2392de08fdf1859432ee"}, {&(0x7f0000000700)="8ac0f9c82d74fa6947a1ad63ff3abbf6d37b060aba7be4ff6a0517298305fdc311e8255988eae5bf87cb143b450387cbc1eb11327a359b469ffea3713f664d69609b2f3df9c6915b583d39e13d686e4ee983f7d0e15783c5a967b9b45160ea57c211ed0aac38da8107f271d152547d316ece91e8e92550b7c3d3c4541ccbbb008d85487fe0260bf82aa2de4298"}, {&(0x7f00000007c0)="cf0a58b3982e5035f8350865625b1bccd4d66926f306fed943cd0d6c27fe2a5655673fb3a2337c572fe9968cc00e401b30f986f0c601c54bd3c4b2ceca7d84"}, {&(0x7f0000000800)="a7c13004707959761b5d19b01b0d1860af34211a6b1499bb3e8c704c0048b001143d452382d6c66dbd26a7773696e13540fd456d6ab597dee59a97fa2f10f74a5c73adfafcdc93841007ef9e68a265f3d52a2c3d934543209b85b72a020ebe6524c1d2dac246ec5371b0eeabcee88c2280a5bbf7ef70bb50c0a5c8ac19cb952573df620df54cc71dca146c442683aca40dff562ab1cf798c067348b6235674eb6201ea80640c2490999f535dd5b8e6aa"}], 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 16:04:36 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:04:36 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:04:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x5, 0x800) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x245, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x40800) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x80000000) 16:04:36 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:04:36 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1212.528126][T21418] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1212.555709][T21418] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1212.565698][T21413] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:37 executing program 0: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000500)={&(0x7f0000ff7000/0x2000)=nil, 0x2000}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x1, 0x11011, r0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) writev(r2, &(0x7f0000000380)=[{&(0x7f0000000200)="e5", 0x1}], 0x1) writev(r1, &(0x7f00000003c0), 0x63) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) [ 1212.599864][T21416] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1212.613914][T21416] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:04:37 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:04:37 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1212.760306][T21430] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:37 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:04:37 executing program 0: r0 = syz_open_dev$ptys(&(0x7f0000000000)='/dev/ptys#\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) [ 1212.888241][T21438] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:37 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1212.947183][T21436] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1212.963427][T21436] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1213.016621][T21443] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) pipe(&(0x7f0000000180)={0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_PDEATHSIG(0x1, 0x18) write(r2, &(0x7f0000000340), 0x41395527) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000380)=""/204) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 16:04:47 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:04:47 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:04:47 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:04:47 executing program 0: socket$kcm(0x10, 0x2, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002f00)='pids.events\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="3071b356145bfd73"], 0xfdef) recvmsg(0xffffffffffffffff, 0x0, 0x2000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:04:47 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000000c0)='%]%md5sum$bdev{ppp1\x00') r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) recvmmsg(r1, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) [ 1222.775087][T21466] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:47 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 16:04:47 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:04:47 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x20000, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) setsockopt$inet6_dccp_int(r1, 0x21, 0xc, &(0x7f0000000180)=0x8cb4, 0x4) r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{0x304}, "d4e943643ef52916", "f7c280fcb1a2d1158a12653ec3fa4496", "d4a2f7cd", "f1d25a5406c66c54"}, 0x28) 16:04:47 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet(0x2, 0x803, 0xa0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=@security={'security\x00', 0xe, 0x4, 0x310, 0x300, 0x0, 0x240, 0x300, 0x300, 0x498, 0x498, 0x498, 0x498, 0x498, 0x4, 0x0, {[{{@uncond, 0x0, 0x98, 0xc0}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@ip={@empty, @multicast1, 0x0, 0x0, 'bpq0\x00', 'veth1\x00'}, 0x0, 0x98, 0xc0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0x0, 0x0, 'ip6gretap0\x00', 'ip6gre0\x00'}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="bfa22308ce1b"}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x370) [ 1223.010682][T21579] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:47 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@generic, &(0x7f0000000040)=0x80, 0x800) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[]}}, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000280)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r3, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r3, 0x0) accept4(r3, &(0x7f0000000340)=@ipx, &(0x7f00000003c0)=0x80, 0x180400) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r4, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x74, r5, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x20}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xc}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x74}, 0x1, 0x0, 0x0, 0x40080}, 0x2000d0cc) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r5, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 16:04:47 executing program 0: setrlimit(0x9, &(0x7f0000000200)={0x2}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000040)=ANY=[@ANYPTR], 0x1, 0x1800) msgrcv(r0, &(0x7f0000001300)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f7ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000023000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000431f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005122f6e9ca521d30430594eead0d2bf4138c402ac391f53054de98253c0f1c152b58bb666a430c3823bb9e67361e74ba33c17f962a33d258d71f45f84a89347e2dd8969a2aceb6b862e612f34c84bb13291bc9bc6450cdfc22168ae530773f69fa453e11d5b08b09343233808a6f64f6e9789d0fedd9bb1db9b74426e5e7189ab6ea93dbeea16ecef2d770a5f8cff40aa04a0faef8c68b24e99a144a50583d6d93436cd8feee62b43c45448baf04b53a4a4a"], 0x1008, 0x3, 0x800) r1 = semget$private(0x0, 0x7, 0x0) semop(r1, &(0x7f0000000240), 0x0) semop(r1, &(0x7f0000001200), 0x73b) semctl$SETVAL(r1, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r1, 0x0, 0x0) r2 = semget$private(0x0, 0x7, 0x0) semop(r2, &(0x7f0000001200)=[{0x4, 0x1ff, 0x3000}, {0x0, 0xff, 0x1000}, {0x0, 0x5, 0x1000}], 0x3) semop(r2, &(0x7f0000000240), 0x6) semctl$SETVAL(r2, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r2, 0x0, 0x0) 16:04:47 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1223.381868][T21695] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:57 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x0, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:04:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_open_dev$midi(0x0, 0x6, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x1010, r0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) chown(0x0, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getdents(r0, &(0x7f00000003c0)=""/122, 0x7a) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x200}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f0000000180)) 16:04:57 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:04:57 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 16:04:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) socket$inet6(0xa, 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x3a0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f00000000c0)={0x1}) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:04:57 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x0, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) [ 1233.117751][T21712] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:57 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 16:04:58 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x0, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:04:58 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:04:58 executing program 3: madvise(&(0x7f0000639000/0x3000)=nil, 0x3000, 0x13) 16:04:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x1, @local, 0x6}, @in6={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x14}, 0x8c}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x17}}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e20, 0x5, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6}, @in6={0xa, 0x4e23, 0x8001, @remote, 0x5}, @in6={0xa, 0x4e21, 0x3ff, @rand_addr="f5f7e29fdbd94efd2dbe9728b15d520f", 0x81}], 0xac) 16:04:58 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) pwritev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="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", 0xfb}, {&(0x7f0000000200)="b4be45dac4c8b811f0d118ec43fa48629ba51a08073c60969f84e6981909d3380311dd46e327d4aa1f1569f088e440a42986cc91c717f78ac4ed9e7c9e43a6b6040ffd2936744de53c13a0806e8205409e486eee1a3964b95ffb4e7768b111b192337f590223", 0x66}, {&(0x7f00000000c0)="a78701f6202166ecae313b3cacc3ab385b0f", 0x12}, {&(0x7f0000000480)="f0069114dfaa3492", 0x8}, {&(0x7f00000004c0)="d34e82d1e154d043f1c38ef931f445bbaf760d0e", 0x14}, {&(0x7f0000000500)="463a01fa3d10248d6aa36be6d942b001bbb5da7a668a8cf035c6272269d4fd2ecfa166427e892593cadaf225164b2101d2ee3bc984a43b993a79882288ce5459c721cf24bed35e05b53001252f237ca159c7832c4d251e93905773cc20d61bf3b4858fc5f257b91e65f692fcffedb2059dc8dec7f6a0b852e254c0210addfe360d9feabf3be8255e6a4b16d46800bf58fd8ce5e749b74d0a05d24ae26aa2af88fa", 0xa1}, {&(0x7f00000010c0)="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", 0x1000}, {&(0x7f00000005c0)="15ddab55d3e50af62d26799ce12d1bb0e1064f2b44bce9d2d6600ba6ef1647690b754bb549b884a59dc8db", 0x2b}], 0x8, 0x0) r2 = semget$private(0x0, 0x2000000010a, 0x0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, 0x0, 0x0) semctl$IPC_INFO(r2, 0x4, 0x3, &(0x7f0000000140)=""/158) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000080)=0x8) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000040)=[0x98, 0x8001, 0xbf, 0xb97, 0x9, 0x7]) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 16:04:58 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl(r0, 0x10000089eb, &(0x7f0000000000)) 16:04:58 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="319b"], 0x2) [ 1234.375327][T21743] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:58 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:04:58 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) pipe(0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x200000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 16:04:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000040)) 16:04:59 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:04:59 executing program 0: 16:04:59 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) pipe(0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x200000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 16:04:59 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:04:59 executing program 0: 16:04:59 executing program 3: [ 1235.205906][T21884] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:05:07 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x80) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f00000000c0)={0x0, 0x1000, 0x1, &(0x7f0000000080)=0xd72}) 16:05:07 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:05:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xbb8, 0x0, 0x0) 16:05:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'hsr0\x00'}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) dup2(0xffffffffffffffff, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="020000000100eb8000000000020001", @ANYRES32, @ANYRES32, @ANYBLOB="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", @ANYBLOB="ff0300d982c1f52c94106bf566f4efb6ecab3198213cdd0ea3b40c75707040c465c33687f3e43eb02d19816f8b198d639762924e5be6ae7c0dbe8fdabbffbadeb1d659a44001374f2663e93c7b86e5709ba64a8dfc1d717a7e4444d37400919b9c850186f630761a31ff125c40a07c323562eaf51099f619966caecb338ac82d7f26ff8173080c57dae62996a498de6075cd4832a864d42838cbb0a0df5beda19c42589dbbfe50a3c8752e555cbdca005661469e02933a39fb660de4f02b9286315d07ff7dabf97e60440eb923f38d19e89e64c07ef3000d173b79f7fc53f9f295a7", @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC], 0x8, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {0x0}], 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00L\x00H\x00\x00\x00\x00\x00\x00\xff\x00', 0x1}) 16:05:07 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:05:07 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x800, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r1, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r1, 0x0) getsockopt$nfc_llcp(r1, 0x118, 0x0, &(0x7f00000000c0)=""/54, 0x36) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x6) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) recvmmsg(r2, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:05:07 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:05:08 executing program 0: socketpair(0x2, 0x0, 0x8007ff, &(0x7f0000000000)) [ 1243.615292][T21896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1243.668714][T21899] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:05:08 executing program 0: 16:05:08 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) [ 1243.824579][T21901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 16:05:08 executing program 3: 16:05:08 executing program 0: 16:05:17 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'\xf4\xff\x96', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x8, r1, r2) r3 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r1) add_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="7880b342c38faa63c50f71ad3da980208e7b9b541559b69db9a5a2d3d954397ae5a217a54cc1da5197b93c25c2", 0x2d, r3) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r4, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r4, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r5, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r5, 0x0) ioctl$EVIOCGREP(r5, 0x4010744d, &(0x7f0000000040)=""/174) 16:05:17 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:05:17 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:05:17 executing program 3: 16:05:17 executing program 0: 16:05:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r1, 0x0) mmap(&(0x7f0000ab7000/0x1000)=nil, 0x1000, 0x300000f, 0x10010, r1, 0x1000) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r2, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x515e}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4001) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:05:17 executing program 0: 16:05:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0xfffffefd, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x18, 0x31, 0xffffffffffffffff, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}}, 0x0) [ 1253.022365][T22038] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:05:17 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:05:17 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xc502, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 16:05:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$inet6(0xa, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') chdir(&(0x7f0000000080)='./file0\x00') r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, &(0x7f00000000c0)=""/71, 0x47) 16:05:17 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1253.472286][T22166] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:05:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0xfffffd0f, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) sysinfo(&(0x7f00000000c0)=""/232) 16:05:22 executing program 0: sched_setattr(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) getdents(r0, &(0x7f00000003c0)=""/122, 0x7a) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 16:05:22 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) r1 = getpid() sched_setattr(r1, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7}, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='smaps_rollup\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7}, 0x0) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000200)=r5) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f00000001c0)=0xeca) write(r3, &(0x7f0000000340), 0x41395527) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f00000010c0)=""/4096) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r8 = dup2(r6, r7) accept$nfc_llcp(r8, &(0x7f0000000040), &(0x7f00000000c0)=0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0x3, 0xc9bc8872bd458cc2, 0x8001, 0x1, 'syz1\x00', 0x1}, 0x1, [0x1a3, 0x4, 0x7f, 0x5086, 0x5, 0x1ff, 0x6a, 0x7f, 0x6, 0xba9, 0xbf, 0xfff, 0x10000, 0xffffffff00000002, 0x7fffffff, 0x7ff, 0x1000, 0x9, 0x7fff, 0x6, 0xffffffffffffffe1, 0x80, 0x80000001, 0x56, 0x400, 0x4, 0x3, 0xf60, 0x1000, 0x80, 0x100000001, 0x7, 0x10001, 0x6, 0x8, 0x1, 0x80, 0x6, 0x0, 0x7, 0x5, 0x7, 0x3, 0x6, 0x2, 0x4, 0x2, 0x101, 0x7fffffff, 0x3, 0x0, 0x1f9, 0x4, 0x8001, 0x7, 0x4b97, 0xfffffffffffffff7, 0x10000, 0x9, 0x40, 0x0, 0x4, 0x8f45, 0x3, 0x5, 0x200, 0x1ff, 0x40, 0x1000000000, 0x9, 0x8, 0x80000001, 0x1, 0xfffffffffffffffe, 0xeb7, 0x4b4f, 0xfe, 0x1, 0x400, 0x3, 0xffffffffffffffff, 0x3, 0x400, 0x4, 0x1000, 0x5, 0x2, 0x6, 0xffffffff, 0x100000001, 0x7, 0x1, 0x7, 0x2, 0x3, 0x100000000001, 0x1ff, 0x434ff48a, 0x10001, 0x3, 0xfffffffffffff1b3, 0x3, 0x80, 0x3, 0x200000000007, 0x800, 0x8, 0x7, 0x7fff, 0x3, 0x4, 0x7, 0x1000, 0x5, 0x764f, 0x401, 0x6, 0x1, 0x0, 0x9, 0x400, 0x9, 0x6, 0xfffffffffffffffe, 0x9, 0xffffffffffffffa6, 0x4, 0x2]}) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 16:05:22 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00\x00\xfb\xff\x00\x00\x00\xd8V\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r1, r0) 16:05:22 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:05:22 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:05:22 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:05:22 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) [ 1258.218173][T22186] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:05:22 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:05:22 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:05:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1400000003017fff808fdb003d88c8f00018ee1ba1d7bfb57f47ec00b67a467d17f89d52f4ec0b6101d2850c1e05a64ae4833b3accfb4bd24b1352b0707e16576392e6cb38e5609cf111171a60687229aed66ba28dba358335f479e83d5f9a9193588530372ff378280dcec2efaee5be64e4ce95c17536f7a58453a85a84f46c46a76249f27ea55322e43c1387213dafed266cd6363e29ddb4049106cb1976365999c5f68c28168f9185751cac1e3b61111dba702003564b39c09ab41bb1999b356ff7fa1a7e3544c00cca81de66d7e81ac13ef7004d7f722c1bbd246c5f2d1a746c567be123924fed02de3bc8d165d12cfbc6e94ba751639d80f40a79fd120e1cbe98dd6abf3dde7814ca4358d59a50ec3cd22d086a50b5aa0ebed38bbb8833c2f40dff661b81f2816db86060c85022f25acb"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x400000000000268, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:05:22 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:05:22 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:05:22 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) [ 1258.719214][T22316] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1258.754208][T22316] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:05:29 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:05:29 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:05:29 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x200000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000040)=0x1) openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x201, 0x0) 16:05:29 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:05:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1400000003017fff808fdb003d88c8f00018ee1ba1d7bfb57f47ec00b67a467d17f89d52f4ec0b6101d2850c1e05a64ae4833b3accfb4bd24b1352b0707e16576392e6cb38e5609cf111171a60687229aed66ba28dba358335f479e83d5f9a9193588530372ff378280dcec2efaee5be64e4ce95c17536f7a58453a85a84f46c46a76249f27ea55322e43c1387213dafed266cd6363e29ddb4049106cb1976365999c5f68c28168f9185751cac1e3b61111dba702003564b39c09ab41bb1999b356ff7fa1a7e3544c00cca81de66d7e81ac13ef7004d7f722c1bbd246c5f2d1a746c567be123924fed02de3bc8d165d12cfbc6e94ba751639d80f40a79fd120e1cbe98dd6abf3dde7814ca4358d59a50ec3cd22d086a50b5aa0ebed38bbb8833c2f40dff661b81f2816db86060c85022f25acb"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f0000002600)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/176, 0x43}], 0x1, &(0x7f0000000240)=""/89, 0x59}, 0x3}, {{&(0x7f00000002c0)=@isdn, 0x80, &(0x7f0000000600)=[{&(0x7f0000000340)=""/58, 0x3a}, {&(0x7f0000000380)=""/215, 0xd7}, {&(0x7f0000000480)=""/27, 0x1b}, {&(0x7f00000004c0)=""/95, 0x5f}, {&(0x7f0000000540)=""/11, 0xb}, {&(0x7f0000000580)=""/116, 0x74}], 0x6, &(0x7f0000000680)=""/50, 0x32}, 0x8001}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000800)=""/103, 0x67}], 0x1}, 0x200}, {{&(0x7f00000008c0)=@ll, 0x80, &(0x7f0000001d40)=[{&(0x7f0000000940)=""/174, 0xae}, {&(0x7f0000000a00)=""/130, 0x82}, {&(0x7f0000000c80)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/100, 0x64}, {&(0x7f0000000b40)=""/148, 0x94}, {&(0x7f0000001c80)=""/191, 0xbf}], 0x6, &(0x7f0000001dc0)=""/247, 0xf7}, 0x1}, {{&(0x7f0000001ec0)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001f40)=""/184, 0xb8}, {&(0x7f0000002000)=""/234, 0xea}, {&(0x7f0000000c00)=""/39, 0x27}], 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000002480)=[{&(0x7f0000002140)=""/96, 0x60}, {&(0x7f00000021c0)=""/171, 0xab}, {&(0x7f0000002280)=""/42, 0x2a}, {&(0x7f00000022c0)=""/28, 0x1c}, {&(0x7f0000002300)=""/166, 0xa6}, {&(0x7f00000023c0)=""/184, 0xb8}], 0x6, &(0x7f0000002500)=""/222, 0xde}, 0x200}], 0x6, 0x200002, &(0x7f0000000c40)={0x77359400}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r1, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r1, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000002780)) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x71080, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f00000000c0)={{0x80, 0x59}, 0x0, 0xa45a, 0xffffffff, {0x9, 0x2f}, 0x4, 0x800}) 16:05:29 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = dup(0xffffffffffffffff) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r2, 0x0, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r5, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:05:29 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) [ 1265.521328][T22431] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1265.554145][T22435] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1265.578796][T22440] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1265.584334][T22442] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1265.618504][T22444] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:05:30 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:05:30 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:05:30 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = dup(0xffffffffffffffff) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r2, 0x0, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r5, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:05:30 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r3 = getpgrp(0xffffffffffffffff) prlimit64(r3, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r4 = syz_open_procfs(r3, &(0x7f00000000c0)='net/mcfilter\x00') r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r6 = dup(r5) ioctl$EVIOCGPROP(r6, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r6, 0x0, 0x0) write$P9_RAUTH(r6, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r7) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r9 = dup(r8) ioctl$EVIOCGPROP(r9, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r9, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r4, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() rt_tgsigqueueinfo(r11, r11, 0x16, &(0x7f0000000100)) ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) [ 1265.943603][T22458] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:05:30 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:05:30 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1266.082974][T22463] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1266.122334][T22463] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1266.152492][T22465] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1266.180013][T22465] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:05:30 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)) [ 1266.381543][T22471] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:05:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0xa2, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x5c0842, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000080)={0x5, 0x800, 0x3}) syz_open_dev$ptys(&(0x7f00000000c0)='/dev/ptys#\x00', 0x8, 0x4002) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) poll(&(0x7f00000001c0)=[{r2, 0x40}, {r3, 0x3}], 0x2, 0xffc00000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r4, 0x28, 0x1, &(0x7f0000000140)=0x3, 0x8) 16:05:39 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r3 = getpgrp(0xffffffffffffffff) prlimit64(r3, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r4 = syz_open_procfs(r3, &(0x7f00000000c0)='net/mcfilter\x00') r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r6 = dup(r5) ioctl$EVIOCGPROP(r6, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r6, 0x0, 0x0) write$P9_RAUTH(r6, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r7) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r9 = dup(r8) ioctl$EVIOCGPROP(r9, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r9, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r4, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() rt_tgsigqueueinfo(r11, r11, 0x16, &(0x7f0000000100)) ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) 16:05:39 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:05:39 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r2, 0x0, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES16]]) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r5, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:05:39 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)) 16:05:39 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x102) ioctl$RTC_WIE_OFF(r1, 0x7010) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a8000000", @ANYRES16=r4, @ANYBLOB="01002bbd7000fedbdf25020000009400047f0000000073797a31000000005400070008000400ff0700030000000000000100080003000400000008000200000040000800a75136b20100080003008100000008000300de26ed80778d75c32e5cffc7f0021800000008000300060000000800040005000000080039846b4f2d0400800033fb0c00010073587a30000000000c00010073797a31000000000c00010073797a40725527f7c783f166d38a1957a4277a68b1948bc2d503d75c097684af4aaf4aa400"/209], 0xa8}, 0x1, 0x0, 0x0, 0x2d6769bf5d4e1cc3}, 0x10) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x18, r4, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x40004000}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r5, 0x8}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r6, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r6, 0x0) ioctl$BINDER_THREAD_EXIT(r6, 0x40046208, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1400000003017fff808fdb003d88c8f00018ee1ba1d7bfb57f47ec00b67a467d17f89d52f4ec0b6101d2850c1e05a64ae4833b3accfb4bd24b1352b0707e16576392e6cb38e5609cf111171a60687229aed66ba28dba358335f479e83d5f9a9193588530372ff378280dcec2efaee5be64e4ce95c17536f7a58453a85a84f46c46a76249f27ea55322e43c1387213dafed266cd6363e29ddb4049106cb1976365999c5f68c28168f9185751cac1e3b61111dba702003564b39c09ab41bb1999b356ff7fa1a7e3544c00cca81de66d7e81ac13ef7004d7f722c1bbd246c5f2d1a746c567be123924fed02de3bc8d165d12cfbc6e94ba751639d80f40a79fd120e1cbe98dd6abf3dde7814ca4358d59a50ec3cd22d086a50b5aa0ebed38bbb8833c2f40dff661b81f2816db86060c85022f25acb"], 0x133}}, 0x0) recvmmsg(r7, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:05:39 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)) [ 1274.841729][T22496] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1274.883528][T22496] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1274.886303][T22497] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1274.914618][T22494] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1274.954332][T22494] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:05:39 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:05:39 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r2, 0x0, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES16]]) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r5, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:05:39 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r2, 0x0, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES16]]) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r5, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:05:39 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:05:39 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) [ 1275.355098][T22519] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1275.476291][T22520] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1275.523476][T22520] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1275.554254][T22524] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1275.586735][T22524] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:05:48 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={r3}) 16:05:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000280)={r0}) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f00000002c0)={0x20}, 0x1) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:05:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet(0x2, 0x803, 0xa0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) setsockopt$inet_pktinfo(r1, 0x0, 0xa, &(0x7f0000000100)={0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3) 16:05:48 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:05:48 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r2, 0x0, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES16]]) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r5, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:05:48 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x7b, &(0x7f00000000c0)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000006c0)={r4, 0x94, &(0x7f0000000600)=[@in6={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0xd}, 0x9}, @in={0x2, 0x8001, @multicast1}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e23, 0x2, @rand_addr="2abf7416f436808370b7cbc767e7afa4", 0xaf98}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e23, 0x1000, @mcast1, 0x1}]}, &(0x7f0000000700)=0x10) write(r1, &(0x7f0000000340), 0x41395527) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1, 0x1}, 0x0, 0x0, &(0x7f0000000240)={0x2, 0xe, 0x9, 0x7}, &(0x7f0000000440)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x6}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r5, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f00000005c0)=0x1) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r5, 0x0) r6 = syz_open_pts(r5, 0x882) pread64(r6, &(0x7f0000000140)=""/249, 0xf9, 0x81) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r7, 0x5385, &(0x7f0000000380)={0xab, ""/171}) 16:05:48 executing program 3: socket(0x0, 0x0, 0xfe) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c2, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0xa10, r0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = dup2(r0, r1) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r2, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 16:05:48 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f00000000c0)={r2}) [ 1284.204689][T22645] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1284.242115][T22649] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1284.280584][T22649] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1284.316492][ T26] audit: type=1804 audit(1575389148.696:45): pid=22655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir789403479/syzkaller.D7AVNJ/400/file0" dev="sda1" ino=16619 res=1 16:05:48 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:05:48 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$l2tp(0x18, 0x1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r2, &(0x7f00000017c0), 0x333, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r3, &(0x7f00000017c0), 0x333, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040), 0x20) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000140), 0x8) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) [ 1284.364536][ T26] audit: type=1804 audit(1575389148.736:46): pid=22655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir789403479/syzkaller.D7AVNJ/400/file0" dev="sda1" ino=16619 res=1 16:05:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x4, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f00000001c0)) read(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 16:05:48 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f00000000c0)={r2}) [ 1284.512593][T22668] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:05:49 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:05:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:05:49 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f00000000c0)={r2}) 16:05:49 executing program 3: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x401}) write$P9_RATTACH(r0, &(0x7f0000000100)={0x14}, 0x14) 16:05:49 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$l2tp(0x18, 0x1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r2, &(0x7f00000017c0), 0x333, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r3, &(0x7f00000017c0), 0x333, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040), 0x20) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000140), 0x8) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) [ 1284.956692][T22685] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:05:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be9", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}, 0x0) 16:05:57 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, 0x0) 16:05:57 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuseblk\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:05:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xffffffff, 0x4000) pipe2(&(0x7f0000000040), 0x6800) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000240)) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r1, 0x1a892000) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r1, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f00000000c0)) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f0000000300)=""/145, 0x6ecea3b82b3112f3}, &(0x7f00000001c0), 0x60}, 0x20) recvmmsg(r0, &(0x7f00000013c0), 0x20e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:05:57 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:05:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r0, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000400)=0x9) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000480)=[{&(0x7f00000004c0)="6c12baaddad7de3a9fc96abe8ab52ce317e738b534ef7be44e81114bac81a27b09cd78544f5accd963d8dc328236397c0a637ef608981843553e537eec6740ae12bb3588d8171361197ef46141161befa32900c6caad854be8945dfeb34ce34dbb672e84184eba7495f90a6b5a6993917d4ce61652d9547134f7354b3a50240192cc4d558c52a1d83ffac2edfe1abe78c0d766cf7a71deb0fb24d81dd28f5de8b0d4755a3d740b614e2241692865098ffa59b2f2db4542b23722b20f0a9cd0bd98688811711c2c3f1b998683b75b16b6bbaac208475c88d3a38de23111b4", 0xde}, {&(0x7f0000000440)="2b1a602831e0b8f6820cde3a436667fa13d97c1f3b670ce00b318c17a16d138ad98adf2f71841dbea0eddc01938d", 0x2e}], 0x2, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x2482, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000003c0)=[@in={0x2, 0x4e20, @rand_addr=0x10000}, @in6={0xa, 0x4a24, 0x8, @ipv4={[], [], @multicast2}, 0x8}], 0x2c) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000140)={0x15, 0x110, 0xfa00, {r6, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e23, @multicast1}}}, 0x118) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r7, 0x111, 0x3, 0x1, 0x4) ioctl$EVIOCGREP(r1, 0x4010744d, &(0x7f0000001000)=""/174) 16:05:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x6a0a82, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = socket(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002ec0), 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) io_setup(0x0, 0x0) dup(0xffffffffffffffff) io_setup(0x0, 0x0) io_submit(0x0, 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000002340)='/proc/self/attr/current\x00', 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r3, 0x0, 0x0) io_setup(0x0, 0x0) io_submit(0x0, 0x0, 0x0) dup(0xffffffffffffffff) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r4, 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f000000a340)=[0x0, 0x0]) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) poll(0x0, 0x0, 0x6) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af12, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) [ 1292.794110][T22813] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:05:57 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, 0x0) 16:05:57 executing program 3: 16:05:57 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r2, 0x0, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r5, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:05:57 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, 0x0) 16:05:57 executing program 3: 16:05:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x6a0a82, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = socket(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002ec0), 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) io_setup(0x0, 0x0) dup(0xffffffffffffffff) io_setup(0x0, 0x0) io_submit(0x0, 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000002340)='/proc/self/attr/current\x00', 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r3, 0x0, 0x0) io_setup(0x0, 0x0) io_submit(0x0, 0x0, 0x0) dup(0xffffffffffffffff) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r4, 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f000000a340)=[0x0, 0x0]) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) poll(0x0, 0x0, 0x6) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af12, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) 16:05:57 executing program 3: [ 1293.403269][T22851] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:05:57 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)) 16:05:58 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r2, 0x0, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r5, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:05:58 executing program 3: 16:06:06 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev\xe2\xba\xec\x84\x00', 0x84502, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 16:06:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYRES32=r0, @ANYBLOB="4f28ba160467943f7b800c1476662161cb145a41b0e00b70e691d4931ea8b85c99d3cb26b4130837c057969ed9d6b8d645741144003b7eaa834378b695ea8634a2d69df4659948e9ff051789539cd29f64b4b595a6fec951c433c81cf356a308eb03e752f44ed33580ae922701ffac9a44dce99557c8f05a", @ANYRES64=0x0, @ANYRES32], 0x88}, 0x1, 0x0, 0x0, 0x8000}, 0x800) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) r1 = socket$caif_stream(0x25, 0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) 16:06:06 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)) 16:06:06 executing program 0: 16:06:06 executing program 3: 16:06:06 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r2, 0x0, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r5, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:06:06 executing program 0: 16:06:06 executing program 3: [ 1302.263229][T23083] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:06:06 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)) 16:06:06 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:06 executing program 3: 16:06:06 executing program 0: 16:06:12 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 16:06:12 executing program 4: 16:06:12 executing program 3: 16:06:12 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00\x00\xfb\xff\x00\x00\x00\xd8V\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000380)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\xf5\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) 16:06:12 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x110c80}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x7c, r2, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xba24}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x7}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}]}, 0x7c}}, 0x40040) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2000, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000340)=0x6) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 16:06:13 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$rose(r0, 0x104, 0x1, 0x0, &(0x7f00000003c0)) 16:06:13 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000440)={0x0, @in={{0x2, 0x0, @local}}}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000600)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:06:13 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) [ 1308.771958][T23220] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:06:13 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 16:06:13 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x7b, &(0x7f00000000c0)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000006c0)={r4, 0x94, &(0x7f0000000600)=[@in6={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0xd}, 0x9}, @in={0x2, 0x8001, @multicast1}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e23, 0x2, @rand_addr="2abf7416f436808370b7cbc767e7afa4", 0xaf98}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e23, 0x1000, @mcast1, 0x1}]}, &(0x7f0000000700)=0x10) write(r1, &(0x7f0000000340), 0x41395527) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1, 0x1}, 0x0, 0x0, &(0x7f0000000240)={0x2, 0xe, 0x9, 0x7}, &(0x7f0000000440)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x6}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r5, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f00000005c0)=0x1) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r5, 0x0) r6 = syz_open_pts(r5, 0x882) pread64(r6, &(0x7f0000000140)=""/249, 0xf9, 0x81) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r7, 0x5385, &(0x7f0000000380)={0xab, ""/171}) 16:06:13 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1309.134964][T23352] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1309.154567][T23352] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1314.843540][T23360] RDS: rds_bind could not find a transport for ::ffff:172.30.0.2, load rds_tcp or rds_rdma? 16:06:20 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f0000000040)) r2 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x4, 0x2000) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0xdfb92b8483b3fcc6, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x0) ioctl$SCSI_IOCTL_SYNC(r3, 0x4) syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3bf0, 0x200) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 16:06:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) 16:06:20 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:20 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1558, 0x1) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) r1 = socket(0x11, 0xa, 0x7) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000980)=0x8001, 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) fsetxattr$security_capability(r2, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0xa0d4, 0x5}, {0x7, 0xffe}]}, 0x14, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r3, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r3, 0x0) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000140)=""/147) socket$isdn(0x22, 0x3, 0x6f) 16:06:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1400000003017fff808fdb003d88c8f00018ee1ba1d7bfb57f47ec00b67a467d17f89d52f4ec0b6101d2850c1e05a64ae4833b3accfb4bd24b1352b0707e16576392e6cb38e5609cf111171a60687229aed66ba28dba358335f479e83d5f9a9193588530372ff378280dcec2efaee5be64e4ce95c17536f7a58453a85a84f46c46a76249f27ea55322e43c1387213dafed266cd6363e29ddb4049106cb1976365999c5f68c28168f9185751cac1e3b61111dba702003564b39c09ab41bb1999b356ff7fa1a7e3544c00cca81de66d7e81ac13ef7004d7f722c1bbd246c5f2d1a746c567be123924fed02de3bc8d165d12cfbc6e94ba751639d80f40a79fd120e1cbe98dd6abf3dde7814ca4358d59a50ec3cd22d086a50b5aa0ebed38bbb8833c2f40dff661b81f2816db86060c85022f25acb"], 0x133}}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$TIOCSIG(r1, 0x40045436, 0x37) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x8) 16:06:20 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1316.092761][T23368] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:06:20 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1316.141626][T23370] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1316.166010][T23370] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:06:20 executing program 0: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/251}, 0x103, 0x0, 0x1000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r3, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r3, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7}, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) r6 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r9, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r9, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r9, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f0000000580)=ANY=[@ANYRESDEC, @ANYPTR64, @ANYBLOB="4ed9b9d312ba41da0c203cb9b76df2e2c1b2fd2fae28e8fdbfaaa30a9f760715f67f545135533d6a84e36d29a0b25edaa013192ae55b57ed5d4af46b33badd2b02360e55f00dc12d2be071261b72beedc350dfdf98949b11cadddcdfdee79a87f0556317b935f1593a8982ca7effc52268dbeedd8b5415ad9228b41e280c0a1a0276679fca501f19ee210b5813655d5d04d4646cb9952250257eaadc5237bbbb6e688d1e8da71a3c926a32024ffe68a802f5a42162280779c0af02b73536f35d7c7b8b4fb4b19d07ab885f2ddd1fc199b9d0b4ea88be02bdf7518c61035ec115f38b756d1f481cb49c5882", @ANYRESDEC=r1, @ANYRES16=0x0, @ANYRES64=r4, @ANYRES64=r1], @ANYRES16=0x0, @ANYRESHEX=r2, @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRESHEX=r9, @ANYRES32=r6, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESHEX, @ANYRES64=r4, @ANYRESHEX=r7, @ANYRESHEX, @ANYPTR64, @ANYPTR=&(0x7f0000000c80)=ANY=[@ANYBLOB="89477a4a141ba17783835439ee85d4f09628adc4df23e9de1e71b8fcd34c650e83badc1e7fc766272896b64ae4f0bf8b7ddcff7b36d8a7e51f1940ab18b50d3964305b89aee69cb009e6de6f3d5c8cd74ae797d0cda175ace9077cc2ad730e37d934b809a667a5f61d9d12a108cce82bb64a00797db351f232f86fcf809411a0c732823c67f8290110fb4c95d8dcc0d7254bc6a38621572ee57101dd301e5a865828e4fc1c1e0cebf3c32b0275ade4aaee26e2a6174aba98f7f55fc78a33ddecb72a6c913836ff2237bb5a46ee35496cb4df64841655ca6e196bea34", @ANYRES32=r5, @ANYRES32, @ANYBLOB="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", @ANYRESDEC=r3]], @ANYRES32=r1]}}, 0x0) recvmmsg(r1, &(0x7f0000003080), 0x0, 0x200002, &(0x7f0000000c40)={0x77359400}) [ 1316.472653][T23477] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:06:20 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, 0x0) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1316.520862][T23477] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:06:21 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/71, 0x47) [ 1316.808347][T23489] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:06:21 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, 0x0) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1317.029748][T23495] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1317.078631][T23502] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1317.254471][T23503] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:06:29 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000040}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x70bd28, 0x25dfdbfd, {}, [{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}]}, 0x3c}}, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400, 0x0) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0xede2) fsync(r2) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) bind$ax25(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default]}, 0x48) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) ioctl$RTC_UIE_ON(r5, 0x7003) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cachefiles\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r4, &(0x7f00000004c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000480)={0xffffffffffffffff}, 0x4, {0xa, 0x4e24, 0xe58, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r6, &(0x7f0000000500)={0x11, 0x10, 0xfa00, {&(0x7f0000000440), r7}}, 0x18) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e22, @broadcast}, 0x10) 16:06:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x17d}, 0x1, 0x0, 0x0, 0x40}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:06:29 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, 0x0) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:29 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/251}, 0x103, 0x0, 0x1000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r3, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r3, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7}, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) r6 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r9, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r9, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r9, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f0000000580)=ANY=[@ANYRESDEC, @ANYPTR64, @ANYBLOB="4ed9b9d312ba41da0c203cb9b76df2e2c1b2fd2fae28e8fdbfaaa30a9f760715f67f545135533d6a84e36d29a0b25edaa013192ae55b57ed5d4af46b33badd2b02360e55f00dc12d2be071261b72beedc350dfdf98949b11cadddcdfdee79a87f0556317b935f1593a8982ca7effc52268dbeedd8b5415ad9228b41e280c0a1a0276679fca501f19ee210b5813655d5d04d4646cb9952250257eaadc5237bbbb6e688d1e8da71a3c926a32024ffe68a802f5a42162280779c0af02b73536f35d7c7b8b4fb4b19d07ab885f2ddd1fc199b9d0b4ea88be02bdf7518c61035ec115f38b756d1f481cb49c5882", @ANYRESDEC=r1, @ANYRES16=0x0, @ANYRES64=r4, @ANYRES64=r1], @ANYRES16=0x0, @ANYRESHEX=r2, @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRESHEX=r9, @ANYRES32=r6, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESHEX, @ANYRES64=r4, @ANYRESHEX=r7, @ANYRESHEX, @ANYPTR64, @ANYPTR=&(0x7f0000000c80)=ANY=[@ANYBLOB="89477a4a141ba17783835439ee85d4f09628adc4df23e9de1e71b8fcd34c650e83badc1e7fc766272896b64ae4f0bf8b7ddcff7b36d8a7e51f1940ab18b50d3964305b89aee69cb009e6de6f3d5c8cd74ae797d0cda175ace9077cc2ad730e37d934b809a667a5f61d9d12a108cce82bb64a00797db351f232f86fcf809411a0c732823c67f8290110fb4c95d8dcc0d7254bc6a38621572ee57101dd301e5a865828e4fc1c1e0cebf3c32b0275ade4aaee26e2a6174aba98f7f55fc78a33ddecb72a6c913836ff2237bb5a46ee35496cb4df64841655ca6e196bea34", @ANYRES32=r5, @ANYRES32, @ANYBLOB="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", @ANYRESDEC=r3]], @ANYRES32=r1]}}, 0x0) recvmmsg(r1, &(0x7f0000003080), 0x0, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:06:29 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, 0x0) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:29 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1325.333160][T23524] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1325.346480][T23523] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1325.370615][T23516] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1325.386760][T23523] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1325.405179][T23516] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:06:29 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:29 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, 0x0) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:29 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1325.684252][T23537] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1325.803688][T23542] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1325.829803][T23546] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 16:06:30 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1325.845726][T23542] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1325.865378][T23546] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:06:30 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:30 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f00000000c0)={{0x2, 0x0, @descriptor="a8a5d3b7783f9e18"}}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000380)={&(0x7f0000000140)=@name={0x1e, 0x2, 0x2, {{0x41, 0x4}, 0x2}}, 0x10, &(0x7f0000000280)=[{&(0x7f00000001c0)="ff624ce9ed7147ce6f5eae418dee661330a5c87a782488bca6d02831ce50d3629220afd646ee3203fa529abf6b348d74a33fb7052a21175b755f4c09686b68fcd55fc775c7d476a21fb935a6f699eeffafe9c7e59e1216b10fa58461116208db7e063d274591ca4e4963cc4b2de06c66aec0cb49ec25d644ad134add4494cfddd2aede69d81e3bf3b8f9f9786d00a39d5e21c448be77ec2c153b91fb9410c870fb848f28ffab20221284c2", 0xab}], 0x1, &(0x7f00000002c0)="2b7b282b3e5dc68f548d67a1f8ec49312b3b247aa1ee88e65e62e1fa9162dfdaf0e674fa38baef23e6fa963d0100bfc293244af66dbb6e96584c01400d5edb6750430c5b53bd25225cd0847dc14283e6d0352e5373d60e888dde58599fa9c480a0f4537ac47ff3f77b2568c31e6399cd1ebd7173204cc18b563a40f45c24eccee85f084e22ff27ca54ad5498d208f1e740", 0x91, 0x40000}, 0x8050) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000040)=@v2={0x2, @aes128, 0x4, [], "2ad72175ed6796cc2a206ba8fc82ec21"}) recvmmsg(r1, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) [ 1326.171524][T23551] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1326.312613][T23557] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1326.368038][T23664] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:06:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='9\xa2\x00', 0x402000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000040)="f77fbdbf198bca4c6e45eccf52fa71d7ba"}, {&(0x7f00000010c0)="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"}, {&(0x7f0000000080)}, {&(0x7f0000000180)="69186642"}], 0x1, 0x1) ioctl$SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x2272, &(0x7f0000000080)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 16:06:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x56, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:06:36 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:36 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:36 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(0xffffffffffffffff) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:06:36 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x40100, 0x0) write$FUSE_OPEN(r3, &(0x7f0000000240)={0x20, 0x0, 0x1, {0x0, 0x3}}, 0x20) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x6, 0x10, r2, 0x2aa5e000) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000280)={0x4000800, 0x5, 0x3}) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESDEC=r4, @ANYRESHEX=r1, @ANYRESHEX=r1, @ANYRESDEC]], 0x8}, 0x1, 0x0, 0x0, 0x40000}, 0x40) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fsetxattr$security_smack_transmute(r6, &(0x7f0000000440)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000480)='TRUE', 0x4, 0x2) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r5}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000300)={@mcast1, 0x56, r5}) r7 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_mreqsrc(r7, 0x0, 0x25, &(0x7f0000000040)={@local, @empty, @empty}, 0xc) recvmmsg(r1, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f00000000c0)={0x157e, 0x400, 0x4, 'queue0\x00', 0xffffffe1}) [ 1331.832095][T23681] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:06:36 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(0xffffffffffffffff) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) [ 1331.948475][T23682] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 16:06:36 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1332.001604][T23690] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:06:36 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1332.271836][T23705] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:06:36 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1332.342156][T23704] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1332.386200][T23704] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:06:36 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:36 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1332.771343][T23717] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:06:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) r2 = dup(r1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x8c, r3, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x273714237e80235f}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @rand_addr=0x3}}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x1b}}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x8c}, 0x1, 0x0, 0x0, 0x2000}, 0x4000) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:06:43 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:43 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:43 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:43 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:43 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)=0x1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) r3 = dup2(r0, r1) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r3, 0x29, 0xd3, &(0x7f00000001c0)={{0xa, 0x4e21, 0xef9, @remote, 0xc991}, {0xa, 0x4e20, 0x2, @loopback, 0x5}, 0xffff, [0x8, 0x3, 0x10001, 0x6, 0xffff7fff, 0x3, 0xffffffc1, 0x1ff]}, 0x5c) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000380)=0xfffffffffffffe05) setreuid(0x0, r6) r7 = getgid() chown(&(0x7f0000000140)='./file0\x00', r6, r7) socket$can_raw(0x1d, 0x3, 0x1) r8 = socket$rds(0x15, 0x5, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KVM_GET_VCPU_EVENTS(r9, 0x8040ae9f, &(0x7f0000000080)) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r10, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x10010, r10, 0x7d703000) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r10, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x4cc) connect$bt_rfcomm(r10, &(0x7f00000000c0)={0x1f, {0x0, 0x40, 0x5, 0x3, 0xfb, 0x7}, 0x4}, 0xa) vmsplice(r8, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r2, 0x4010744d, &(0x7f0000001000)=""/174) [ 1339.190706][T23737] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1339.226416][T23739] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1339.240721][T23739] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:06:43 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xa6080, 0x0) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f00000000c0)={@bcast, @null}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x3, 0x4, 0x10001, 0x81, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000180)={r4, 0x8, 0x5, [0xab5, 0x9, 0xfff7, 0x5, 0x1f]}, &(0x7f00000001c0)=0x12) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) [ 1339.304579][T23735] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1339.326587][T23732] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 16:06:43 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:43 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = dup(0xffffffffffffffff) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) [ 1339.485538][T23733] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1339.606205][T23751] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 16:06:44 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x4c, 0x200002, &(0x7f0000000c40)={0x77359400}) [ 1339.736621][T23760] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1339.766308][T23757] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1339.907135][T23766] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:06:44 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = dup(0xffffffffffffffff) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:06:44 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:44 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = dup(0xffffffffffffffff) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) [ 1340.245621][T23876] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 16:06:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x529784, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000000c0)) 16:06:44 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1340.426952][T23878] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:06:50 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000000040)=""/166) 16:06:50 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = dup(0xffffffffffffffff) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:06:50 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000500)={r3, 0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000300)={r3, 0x17}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f00000001c0)={r3, 0x2, &(0x7f0000000040)=[0x2, 0x8], &(0x7f00000000c0)=[0x7, 0x0, 0x8001], 0x10, 0x2, 0x8, &(0x7f0000000100)=[0x9, 0x1b3], &(0x7f0000000140)=[0x3ff, 0x7fffffff]}) write(r0, &(0x7f0000000340), 0x41395527) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[], 0xfffffeaf}, 0x1, 0x0, 0x0, 0x80}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:06:50 executing program 4: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockname(r2, 0x0, 0x0) 16:06:50 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() rt_tgsigqueueinfo(r11, r11, 0x16, &(0x7f0000000100)) ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) 16:06:50 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:50 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0xfffffffffffffcf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9fc3e6981cdaa323d695c665a50bd1a286b2445614306acda9963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f1463932e350370ada4dbcf64d21c0af0908493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d1"], 0x5) syz_genetlink_get_family_id$team(0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) [ 1345.963855][T24015] __nla_validate_parse: 1 callbacks suppressed [ 1345.963898][T24015] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1345.981947][T24011] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1345.992722][T24014] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:06:50 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0x0, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:50 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0xa, 0x0, @loopback}}}, 0x98) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x4, 0x2011, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl(r0, 0x0, &(0x7f0000000100)="9a950af1d7bfa9be3612bc71f961db5268e3f0982a478757ce008b0cb0ceb45a232a4bb1a7eaad607566e579afe5f1af81042fd552b2eda91a38d12d0be287a488d2e71d4f419fe91c55dbd16eaa0b9e4585e952295f9ef72cbb1d8c77b27065d2a33af63e3cf05f424dcea06ff15d10783c2578954f985d0515443120b4ec03887a0c2c375187daae7df0c7f89a921c59e8a9e765536159d8df53339466a7af384cda56e2a4f85fea6b89af1ee8b5009eaf95f36a00a7a4fbe886bb289da3e78a1861117c543448c4d73483fa88a75c268dee1257de6417f35b791d09e8bd2bebdf2fb7") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='c\x1b\x95\xff<:\xec\x90\x9f\v\xfd\xc6pu.stat\x00', 0x275a, 0x0) r1 = socket$inet6(0xa, 0x80000, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") 16:06:50 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() rt_tgsigqueueinfo(r11, r11, 0x16, &(0x7f0000000100)) ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) [ 1346.197765][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1346.203684][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1346.270817][T24130] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1346.354816][T24136] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:06:50 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0x0, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:50 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() rt_tgsigqueueinfo(r11, r11, 0x16, &(0x7f0000000100)) ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) [ 1346.517757][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1346.523557][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1346.681980][T24149] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1346.711389][T24150] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1346.837744][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1346.843633][ C1] protocol 88fb is buggy, dev hsr_slave_1 16:06:56 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x70, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x2, 0x200) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8108551b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80045510, &(0x7f0000000100)) socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x298f42, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r2, 0x4010744d, &(0x7f0000001000)=""/174) 16:06:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x7b, &(0x7f00000000c0)={r3}, 0x8) socketpair(0x9, 0x3, 0x6, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000100)={r3, 0x5}, 0x4f71561811ab6afa) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:06:56 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0x0, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:06:56 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0xfffffffffffffcf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9fc3e6981cdaa323d695c665a50bd1a286b2445614306acda9963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f1463932e350370ada4dbcf64d21c0af0908493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d1"], 0x5) syz_genetlink_get_family_id$team(0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) 16:06:56 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() rt_tgsigqueueinfo(r11, r11, 0x16, &(0x7f0000000100)) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) 16:06:56 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuseblk\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1352.630255][T24175] fuse: Bad value for 'fd' 16:06:57 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f00000001c0)) read(r1, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r3) [ 1352.757746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1352.763628][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1352.773038][T24174] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:06:57 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() rt_tgsigqueueinfo(r11, r11, 0x16, &(0x7f0000000100)) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) 16:06:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x7b, &(0x7f00000000c0)=ANY=[@ANYRES32=r4, @ANYBLOB="fd9d"], 0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000000c0)={r4, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r6, 0x84, 0x7b, &(0x7f00000000c0)={r8}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000001c0)={r8, 0xc2, "552442c1b43c1a7c4b4b6081854dd4b97ea85fcea9894935b01b2919100e12d8e2f53f45b7a85a6b78bbfc7bcaed9140c7769b9159c68cfdcd2c019160de63ef65ae4d7ddc58573edd29fdbf0d99a6cb7e8800e8c814def1fbe0daaaf5e1f81311f9751b653af33d9f41ca3a0a09db7c7bd33481b7fe5f6f8de78cebd2141bdb5d84d81188969e37a9ff88244ebe1020baf1465f244143058e40eb3dcae7ce675c336359b314d6945e1800c0e11c49533821a12c9a56fa61883ff133dd486fb320e8"}, &(0x7f00000002c0)=0xca) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000300)={r9, @in6={{0xa, 0x4e20, 0x5, @loopback, 0x711}}, [0x0, 0x6, 0x9, 0x9424, 0x6, 0x4, 0x7, 0xdc, 0x8, 0x2, 0x7, 0x9, 0x1, 0x9, 0x6]}, &(0x7f0000000400)=0x100) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1400000003017fff808fdb003d88c8f00018ee1ba1d7bfb57f47ec00b67a467d17f89d52f4ec0b6101d2850c1e05a64ae4833b3accfb4bd24b1352b0707e16576392e6cb38e5609cf111171a60687229aed66ba28dba358335f479e83d5f9a9193588530372ff378280dcec2efaee5be64e4ce95c17536f7a58453a85a84f46c46a76249f27ea55322e43c1387213dafed266cd6363e29ddb4049106cb1976365999c5f68c28168f9185751cac1e3b61111dba702003564b39c09ab41bb1999b356ff7fa1a7e3544c00cca81de66d7e81ac13ef7004d7f722c1bbd246c5f2d1a746c567be123924fed02de3bc8d165d12cfbc6e94ba751639d80f40a79fd120e1cbe98dd6abf3dde7814ca4358d59a50ec3cd22d086a50b5aa0ebed38bbb8833c2f40dff661b81f2816db86060c85022f25acb"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:06:57 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f00000001c0)) read(r1, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r3) [ 1353.077750][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1353.083879][ C1] protocol 88fb is buggy, dev hsr_slave_1 16:06:57 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x0, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1353.165976][T24292] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:06:57 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() rt_tgsigqueueinfo(r11, r11, 0x16, &(0x7f0000000100)) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) [ 1353.238109][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1353.244700][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1353.386940][T24300] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1353.469619][T24304] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:07:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f00000001c0)) read(r1, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r3) 16:07:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000003017fff808fdb003d88c8f00018ee1ba1d7bfb57f47ec00b67a467d17f89d52f4ec0b6101d2850c1e05a64ae4833b3accfb4bd24b1352b0707e16576392e6cb38e5609cf111171a60687229aed66ba28dba358335f479e83d5f9a9193588530372ff378280dcec2efaee5be64e4ce95c17536f7a58453a85a84f46c46a76249f27ea55322e43c1387213dafed266cd6363e29ddb4049106cb1976365999c5f68c28168f9185751cac1e3b61111dba702003564b39c09ab41bb1999b356ff7a81c0f10e531a33689566506fa1a7e3544c00cca81de66d7e81ac13ef7004d7f722c1bbd246c5f2d1a746c567be123924fed02de3bc8d165d12cfbc6e94ba751639d80f40a79fd120e1cbe98dd6abf3dde7814ca4358d59a50ec3cd22d086a50b5aa0ebed38bbb8833c2f40dff661b81f2816db86060c85022f25acb"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:07:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 16:07:02 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x0, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000380)="aa85237c89de7b59edc07e3de3c5cae7682071a5f5ee889c0f7363ea3c92492e2e983c21c26ba39b64f804d35116d7a8b1a65ffc08f8da4982301210b46ddf0c516b3043977fb09a485af6f0b1ec7503d6136206bc33d3cab2cdfab4242501ddc3a1a7e3f782d7e803045a1473b2c720a12d8004033aaca3e888f0016c9acd0fb2eda5f91acae2843b2b5029a5b2e5a31d5ef3f1aaa70f9793f4e5d38786442cfd5ae38e3e109be5524785fd5179bf76c48e684e488cc1a59fae65ad9c38a3efe7650b899d99daae017960a2e61bc232f2", 0xfffffffffffffd1f}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000000040)=""/183) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 16:07:02 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) 16:07:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) waitid(0x0, 0x0, &(0x7f0000000080), 0x20000008, 0x0) [ 1357.935399][T24322] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1357.960606][T24321] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:07:02 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) 16:07:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x4, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f00000001c0)) read(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r3) 16:07:02 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000040)=0x10000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYBLOB="67b757fb", @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYPTR64, @ANYRESOCT=r2], @ANYRES16=r0, @ANYBLOB="85f12414def5052cc4cb3a0f4e047922412d21b605001e1133db559093defa165e5e963af482083f1421ccda14880592a9adb3634306bfc946012da97af3ce790c39e020e4a2edf0f3c6bd", @ANYBLOB="6738f049224ec35fc7957b4e90f46015158c82c0fb982b6c40de44186efe654e6bbe1843c56c829edf4f269c5bdec901a19ccd54e3b8e7b501bd013fd5597e0c688fd663f570a75e722c63f00656a68cde7e9689808a216d9e32fafce39b175f93a0dc96e737ebf6a5bea5a18db3496b59f13ad07fc1357fa43c261bde10f1f26986c3a58d07026840ddd44a33ef0d7d071cbd994fe15551631b131706782e19812469ffa8cb75ecbfb904e0756581c1566cfd898a4dec4c6cf56112e5e38c759554dcde94db8ba6bd1880400c9c120740"]], 0x8}}, 0x4000000) recvmmsg(r2, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) r3 = getpid() arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffff) tkill(r3, 0x5) write$UHID_INPUT2(r1, &(0x7f0000000c80)={0xc, 0x1000, "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"}, 0x1006) 16:07:02 executing program 4: 16:07:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x4, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f00000001c0)) read(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r3) [ 1358.564172][T24435] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:07:03 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x0, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) dup(r0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 16:07:03 executing program 4: 16:07:03 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) [ 1359.016624][T24561] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:07:08 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000), 0x3c3, 0x4) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x0, 'team0\x00', {}, 0x3}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$SNDRV_PCM_IOCTL_DRAIN(r2, 0x4144, 0x0) 16:07:08 executing program 4: 16:07:08 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x0, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:08 executing program 0: 16:07:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x133}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000300)={0x0, 0x7}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000380)={r3, 0x5}, 0x8) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000680)='/dev/cachefiles\x00', 0x28000, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f00000009c0)={0x5}, 0x4) set_mempolicy(0x4000, &(0x7f0000005bc0)=0xffffffffffff8000, 0x4b5e) write(r1, &(0x7f0000000340), 0x41395527) sendmmsg$alg(r1, &(0x7f0000000280)=[{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="57e18d0cb8c279146faa8cc4d1ba6144beead5ce3e568c31839a9b9de33945dca08f378e381d0dd35e00dc987ef56d6cc36536c2245814a4ec4b27f2118c463024f1a82c9672d3e3849d0659b402d761fef29dc3d29aba001a2f0af8270804c7bbabb9a661d7c8af3a1de81039746f8cee197620aaa5aa40", 0x78}], 0x1, &(0x7f0000000140)=[@assoc={0x18, 0x117, 0x4, 0x9d}], 0x18, 0x40080}, {0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=[@op={0x18}, @iv={0x38, 0x117, 0x2, 0x1e, "aee115b5d8491b6bfa15a3940de699b9aea9244988f969f1aec753aef4b9"}, @iv={0x58, 0x117, 0x2, 0x3d, "4b5e12e0d0777b5aa1880ae387e9f7d973fb5d24e8dd3029c051d4d101891a53abe893471ff8eee140fa49429530278e724448f4c9220e8ca3a50a49c5"}], 0xa8, 0x40000}], 0x2, 0x40440f5) r5 = socket$inet_smc(0x2b, 0x1, 0x0) recvmmsg(r5, &(0x7f0000005a40)=[{{&(0x7f00000003c0)=@ipx, 0x80, &(0x7f0000000600)=[{&(0x7f0000000440)=""/153, 0x99}, {&(0x7f0000000500)=""/227, 0xe3}], 0x2, &(0x7f0000000800)=""/179, 0xb3}, 0x800}, {{&(0x7f00000008c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000a00)=""/213, 0xd5}, {&(0x7f0000000b00)=""/130, 0x82}, {&(0x7f0000000640)=""/37, 0x25}, {&(0x7f0000000c80)=""/229, 0xe5}, {&(0x7f0000000d80)=""/192, 0xc0}, {&(0x7f0000000e40)=""/140, 0x8c}], 0x6, &(0x7f0000000f00)=""/4096, 0x1000}, 0x37}, {{&(0x7f0000000bc0)=@x25={0x9, @remote}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001f00)=""/122, 0x7a}, {&(0x7f0000001f80)=""/233, 0xe9}], 0x2, &(0x7f00000020c0)=""/4096, 0x1000}, 0x1}, {{&(0x7f00000030c0)=@alg, 0x80, &(0x7f0000003500)=[{&(0x7f0000003140)=""/28, 0x1c}, {&(0x7f0000003180)=""/17, 0x11}, {&(0x7f00000031c0)=""/164, 0xa4}, {&(0x7f0000003280)=""/30, 0x1e}, {&(0x7f00000032c0)=""/173, 0xad}, {&(0x7f0000003380)=""/37, 0x25}, {&(0x7f00000033c0)=""/21, 0x15}, {&(0x7f0000003400)=""/112, 0x70}, {&(0x7f0000003480)=""/105, 0x69}], 0x9, &(0x7f00000035c0)=""/4096, 0x1000}, 0x3}, {{&(0x7f00000045c0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000005980)=[{&(0x7f0000004640)=""/67, 0x43}, {&(0x7f00000046c0)=""/141, 0x8d}, {&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/255, 0xff}, {&(0x7f0000005880)=""/75, 0x4b}, {&(0x7f0000005900)=""/116, 0x74}], 0x6, &(0x7f0000005a00)=""/33, 0x21}, 0x2}], 0x5, 0xc0001060, &(0x7f0000005b80)={0x77359400}) socket$inet_sctp(0x2, 0x5, 0x84) 16:07:08 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffff) 16:07:08 executing program 0: 16:07:08 executing program 4: 16:07:08 executing program 0: open$dir(0x0, 0x2020231, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x205, 0x0) fcntl$lock(r0, 0x9, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x21000300010015}) [ 1364.313962][T24575] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1364.460210][T24577] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:07:08 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) 16:07:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 16:07:08 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x0, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1364.739120][T24599] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:07:16 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)="670873cb4cacaf6190b4f198f298094b0908712f7ca84dbc5287c2d12a3dd7c1b8efdd8904ae2951eeca359eb0fcc70fd1506610a46024b2c13e3de05f04cee00c25262c7f40af37350224f29d12586bffc95cd3c6d9ea6d205da38cb953b13fdfbab5780859a28341e2b2f69dee70b20e48db4265be1f7daa", 0x79}, {&(0x7f0000000140)="73ab281e9fb39efb397ef5561e6d3374e3f5a2368502548d446f8b95e210c6d46217a8c2711702bccd5d076a0ad9b9c811a48fff68854d9c1241fe3fa54c03f57b54475b2744a84c4915f77c4627b50730a88f5401a1b3eefee3fedd24ccb0bd284edc96990e4ca62c205cef10a9f0c8c9dacda34e49761c7ed7d2529d4ca43f7c14d4ecb42d20d74eed5f5bc9f6f8d4a92a373a2204c7b55550681e164799872fc7bf44428d7eef445dffe3fb68d11d06caeeb0da20aab4aec656eac6055bf335aad117e26bba55b9e52fd9a876b0b7086e1aa1627097688dbb5b6b753878ce45987b0e6adebc5f025b8baec941", 0xee}, {&(0x7f0000000380)="8edb32fa81d286e9dfafd8cb6592209da6a395ddc2f7950df0fc80af117f5d64a2b9a5ffef40d47baa51dae4da749172af7fa87af24ae8ff5287b36061beee0754c4f112555737467670781d203290c6d1cd5f87e280816370a89a3fa2", 0x5d}], 0x3, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 16:07:16 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffff) 16:07:16 executing program 0: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@quota='quota'}, {@quota_on='quota=on'}]}) 16:07:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'hsr0\x00'}) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00L\x00H\x00\x00\x00\x00\x00\x00\xff\x00', 0x1}) 16:07:16 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x0, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$int_in(r0, 0x5421, &(0x7f00000000c0)=0x800) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1400000003017fff808fdb003d88c8f00018ee1ba1d7bfb57f47ec00b67a467d17f89d52f4ec0b6101d2850c1e05a64ae4833b3accfb4bd24b1352b0707e16576392e6cb38e5609cf111171a60687229aed66ba28dba358335f479e83d5f9a9193588530372ff378280dcec2efaee5be64e4ce95c17536f7a58453a85a84f46c46a76249f27ea55322e43c1387213dafed266cd6363e29ddb4049106cb1976365999c5f68c28168f9185751cac1e3b61111dba702003564b39c09ab41bb1999b356ff7fa1a7e3544c00cca81de66d7e81ac13ef7004d7f722c1bbd246c5f2d1a746c567be123924fed02de3bc8d165d12cfbc6e94ba751639d80f40a79fd120e1cbe98dd6abf3dde7814ca4358d59a50ec3cd22d086a50b5aa0ebed38bbb8833c2f40dff661b81f2816db86060c85022f25acb"], 0x133}}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000040)=0x3ff) recvmmsg(r0, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) [ 1372.689029][T24620] gfs2: not a GFS2 filesystem [ 1372.760041][T24620] gfs2: not a GFS2 filesystem 16:07:17 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) [ 1372.879540][T24732] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:07:17 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffff) [ 1372.969851][T24625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 16:07:17 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x0, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1373.111188][T24741] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 16:07:17 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) 16:07:17 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() rt_tgsigqueueinfo(r11, r11, 0x16, &(0x7f0000000100)) ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) [ 1373.329123][T24742] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1373.359394][T24746] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:07:17 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) r11 = getpid() rt_tgsigqueueinfo(r11, r11, 0x16, &(0x7f0000000100)) ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) [ 1373.556550][T24752] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1373.591966][T24753] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1373.761585][T24859] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:07:22 executing program 2: r0 = getgid() r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x202002) keyctl$chown(0x4, r3, 0x0, r2) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r6, 0x202002) keyctl$chown(0x4, r6, 0x0, r5) setresgid(r0, r2, r5) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r7, &(0x7f0000000080)={0x0, 0x190, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[]}}, 0x0) recvmmsg(r7, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:07:22 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) 16:07:22 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:22 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) r11 = getpid() rt_tgsigqueueinfo(r11, r11, 0x16, &(0x7f0000000100)) ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) 16:07:22 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x0, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:22 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7}, 0x0) getpriority(0x2, r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r1, 0x4010744d, &(0x7f0000001000)=""/174) [ 1377.903241][T24875] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1377.916254][T24874] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1377.934163][T24876] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 16:07:22 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) r11 = getpid() rt_tgsigqueueinfo(r11, r11, 0x16, &(0x7f0000000100)) ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) [ 1377.952854][T24877] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 16:07:22 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) r11 = getpid() rt_tgsigqueueinfo(r11, r11, 0x16, &(0x7f0000000100)) ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) 16:07:22 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r11 = getpid() ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xffffffffffffffff) 16:07:22 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x0, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1378.223261][T24984] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:07:22 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r10 = getpid() rt_tgsigqueueinfo(r10, r10, 0x16, &(0x7f0000000100)) ptrace(0x10, r10) ptrace$pokeuser(0x6, r10, 0x388, 0xffffffffffffffff) [ 1378.436168][T24994] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1378.457618][T24996] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 16:07:22 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1378.500964][T24995] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 16:07:23 executing program 2: r0 = getgid() r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x202002) keyctl$chown(0x4, r3, 0x0, r2) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r6, 0x202002) keyctl$chown(0x4, r6, 0x0, r5) setresgid(r0, r2, r5) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r7, &(0x7f0000000080)={0x0, 0x190, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[]}}, 0x0) recvmmsg(r7, &(0x7f00000013c0), 0x5e, 0x200002, &(0x7f0000000c40)={0x77359400}) 16:07:23 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x0, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:23 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x0, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1378.716567][T25002] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1378.806697][T25009] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 16:07:23 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r10 = getpid() rt_tgsigqueueinfo(r10, r10, 0x16, &(0x7f0000000100)) ptrace(0x10, r10) ptrace$pokeuser(0x6, r10, 0x388, 0xffffffffffffffff) 16:07:23 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:30 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7ff) 16:07:30 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x0, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:30 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:30 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r10 = getpid() rt_tgsigqueueinfo(r10, r10, 0x16, &(0x7f0000000100)) ptrace(0x10, r10) ptrace$pokeuser(0x6, r10, 0x388, 0xffffffffffffffff) 16:07:30 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:30 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1386.376878][T25143] __nla_validate_parse: 3 callbacks suppressed [ 1386.376903][T25143] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1386.436757][T25145] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1386.441136][T25143] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1386.471839][T25152] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 16:07:30 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1386.491260][T25149] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1386.526732][T25153] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:07:31 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:31 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:31 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r10 = getpid() rt_tgsigqueueinfo(r10, r10, 0x16, &(0x7f0000000100)) ptrace(0x10, r10) ptrace$pokeuser(0x6, r10, 0x388, 0xffffffffffffffff) [ 1386.772023][T25262] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 16:07:31 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r10 = getpid() rt_tgsigqueueinfo(r10, r10, 0x16, &(0x7f0000000100)) ptrace(0x10, r10) ptrace$pokeuser(0x6, r10, 0x388, 0xffffffffffffffff) [ 1386.956967][T25267] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1387.006385][T25268] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1387.026779][T25273] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:07:31 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x0, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1387.108969][T25271] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1387.312123][T25281] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:07:37 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:37 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:37 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r10 = getpid() rt_tgsigqueueinfo(r10, r10, 0x16, &(0x7f0000000100)) ptrace(0x10, r10) ptrace$pokeuser(0x6, r10, 0x388, 0xffffffffffffffff) 16:07:37 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:37 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x0, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:37 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) write$binfmt_elf32(r1, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x2, 0x3, 0x5, 0x3, 0x6, 0x7fff, 0x158, 0x38, 0x1bb, 0x7f, 0x9, 0x20, 0x1, 0x1, 0xa, 0x7f}, [{0x1, 0x1, 0x200, 0xfff, 0xfffffffc, 0x7, 0xfffffff9}], "6468a2275384a3f304edca6673aab67ce6f13b5a63afff5d109adc6a9e1e38a9d73921274ef930e9092a01dc5a41e32dfd35543db4b4fd16c1478a06d4243bed1af776fdad343a0c455d75566e72c4658a288ea5cbf830720eb8d429ea3c67cbdb341269f85a5de59e3959c2e71f730730809c86769f14b1762bb99b6f0a376fec7fb17af74ef4f5888b075db428668efa659285882765cb33bd6fff2d0bec340dab5e87a0c5a8943916db91a8297387f106eb6a1d4aba1c1d19958dea78c0d2d044ffb3b551e6b0959cba5d9d6f2234357de1fe2fcffc3bbbd4e7e78eb6786bd5129e85bb6f20b50652c46ca79e788662f5b8d319ff1dd748", [[], [], [], [], [], [], [], []]}, 0x951) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000400)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10040}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000c1) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20080000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r4, 0x10, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x4101, 0x0, {0x20, 0x17, {0x6, 0x4, @l2={'eth', 0x3a, 'bridge_slave_0\x00'}}}}, ["", "", "", "", "", "", "", ""]}, 0x3c}}, 0x4000041) [ 1392.801107][T25294] __nla_validate_parse: 1 callbacks suppressed [ 1392.801130][T25294] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1392.876466][T25297] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1392.891977][T25294] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1392.920335][T25299] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1392.930349][T25300] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:07:37 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10000140}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, 0x0, 0xc00, 0x800}, 0x1c}}, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr, @local}, 0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000540)={0x0, 0x1, 0xff}) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:07:37 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1392.973898][T25298] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:07:37 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:37 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r10 = getpid() rt_tgsigqueueinfo(r10, r10, 0x16, &(0x7f0000000100)) ptrace(0x10, r10) ptrace$pokeuser(0x6, r10, 0x388, 0xffffffffffffffff) 16:07:37 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x0, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:37 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x0, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1393.457193][T25418] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1393.493581][T25419] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1393.521346][T25420] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 16:07:37 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r10 = getpid() rt_tgsigqueueinfo(r10, r10, 0x16, &(0x7f0000000100)) ptrace(0x10, r10) ptrace$pokeuser(0x6, r10, 0x388, 0xffffffffffffffff) 16:07:38 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:38 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r10 = getpid() rt_tgsigqueueinfo(r10, r10, 0x16, &(0x7f0000000100)) ptrace(0x10, r10) ptrace$pokeuser(0x6, r10, 0x388, 0xffffffffffffffff) [ 1393.630937][T25427] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1393.843355][T25431] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 16:07:38 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x0, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1393.900587][T25442] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:07:38 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1394.281807][T25452] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 16:07:45 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) mq_unlink(&(0x7f0000000040)='/dev/ppp\x00') 16:07:45 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:07:45 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:07:45 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r10 = getpid() rt_tgsigqueueinfo(r10, r10, 0x16, &(0x7f0000000100)) ptrace(0x10, r10) ptrace$pokeuser(0x6, r10, 0x388, 0xffffffffffffffff) 16:07:45 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r10 = dup(r9) ioctl$EVIOCGPROP(r10, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r11, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xffffffffffffffff) 16:07:45 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x0, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) [ 1401.422654][T25570] __nla_validate_parse: 5 callbacks suppressed [ 1401.422728][T25570] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1401.503685][T25575] cgroup: fork rejected by pids controller in /syz0 [ 1401.513231][T25569] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1401.524408][T25571] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1401.535652][T25569] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1401.545315][T25573] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:07:45 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000001380)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x8}, {}, @raw32}], 0x30) 16:07:46 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, 0x0, 0x0) [ 1401.585660][T25574] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:07:46 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r3, 0x7ffffc, 0x0) write$binfmt_elf64(r3, &(0x7f0000000200)=ANY=[@ANYPTR], 0x8) bind$inet(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 16:07:46 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x0, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:46 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r10 = getpid() rt_tgsigqueueinfo(r10, r10, 0x16, &(0x7f0000000100)) ptrace(0x10, r10) ptrace$pokeuser(0x6, r10, 0x388, 0xffffffffffffffff) 16:07:46 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x4c0700, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x48002, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6) madvise(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x3) [ 1401.979170][T25696] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1402.001716][T25694] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:07:50 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f00000001c0)) read(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r3) 16:07:50 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007bd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000300)='\f', 0xc3f2, 0x11, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet6(0xa, 0x80003, 0x6b) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x10}, {}, {0xffffffffffffffff, 0x200}, {r0, 0x1}, {0xffffffffffffffff, 0x4204}, {r2}], 0x6, &(0x7f0000001340), &(0x7f0000001380)={0x80000000}, 0x8) 16:07:50 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r10 = getpid() rt_tgsigqueueinfo(r10, r10, 0x16, &(0x7f0000000100)) ptrace(0x10, r10) ptrace$pokeuser(0x6, r10, 0x388, 0xffffffffffffffff) 16:07:50 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x0, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f00000002c0)={0x0, 'team_slave_1\x00'}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e1f, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) 16:07:50 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r1, 0xfffff000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x4, 0xc6, 0x20, 0x160000000, 0x7, 0xc0373c76bbced6b, 0xead2, 0x65, 0x40, 0x2ad, 0x2, 0x5, 0x38, 0x1, 0xff, 0x9, 0x1}, [{0x0, 0x1, 0x3, 0x8001, 0x10001, 0x1000, 0x100000000, 0x7}], "003fcb5f4d53a1a44f55826148b5ef1048d5ece73544ba09e32390b8185565eaef545b9ebdc33bd59371732ad17176ffa9ad423c5ebc2940ffc19417bf07d6", [[]]}, 0x1b7) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000006, 0x10, r1, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000240)=0x4) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r3, 0x0) mmap(&(0x7f000094d000/0x200000)=nil, 0x200000, 0x1000006, 0x10, r3, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000500)={r5, 0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000300)={r5, 0x17}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f00000000c0)={r5, 0x10}) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) r7 = dup2(r6, 0xffffffffffffffff) creat(&(0x7f0000000080)='./file0\x00', 0x100) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x10800, 0x0) ioctl$PPPIOCGL2TPSTATS(r8, 0x80487436, &(0x7f00000010c0)="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") openat$cgroup(r7, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) 16:07:51 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r0, r1) 16:07:51 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f00000001c0)) read(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r3) [ 1406.643329][T25816] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1406.676598][T25818] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:07:51 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="fd0000002901000000000000000000000000000000000000007e25cc90d78a27fe07002e7066696c6530ac4f4ca927347482f0ace44e9ad67be1d466fce37f8bc603353610afce743204a957f9cac53b0a2ed6a3f287f1bbe56efe37046c882918c2f3857c98e383b7dd853f714b7b7ae6e5e20f296c9beedf74e5ee0cdcd20600e314205c61a40dfa646510d072feb37b3c304d85a2fc84c6929569c6669f71e0a558a3146da922616932fb0d00ac5707af5f2b0fd46d8c3904d146586216fa0374ecbbdf103f97cb7195ec3be622d00000000000182d8baa708b1f97806b4c8a4e338e791e256ab473fbdeaa69198ca35af9f53cff6a12766d16a1e4a63a56cb2cd4247ad0dde57520654b0a28ce74c466b0151fcc8ebc4dffe614153f9e"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r9 = getpid() rt_tgsigqueueinfo(r9, r9, 0x16, &(0x7f0000000100)) ptrace(0x10, r9) ptrace$pokeuser(0x6, r9, 0x388, 0xffffffffffffffff) 16:07:51 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x0, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r8 = dup(r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r11 = dup(r10) ioctl$EVIOCGPROP(r11, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000440)={0x7b, 0x0, [0x8, 0x2973604e, 0x7, 0x7c4681f7]}) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f0000000100)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xffffffffffffffff) 16:07:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0x0, 0x0) sync() socket$packet(0x11, 0x0, 0x300) 16:07:51 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f00000002c0)={0x0, 'team_slave_1\x00'}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e1f, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) 16:07:51 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f00000002c0)={0x0, 'team_slave_1\x00'}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e1f, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) [ 1407.046538][T26031] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:07:51 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000004c0)={0xffffff80, 0x5, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x8, 0x7, 0x0, 0x1, 0x6, "bcd36908"}, 0x400000, 0x2, @userptr=0x1b7, 0x4}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x14}}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES16]]) write$P9_RREADDIR(r1, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r5, &(0x7f00000000c0)='net/mcfilter\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r7 = dup(r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r7, 0x0, 0x0) write$P9_RAUTH(r7, &(0x7f00000002c0)={0x21d, 0x67, 0x1, {0x102, 0x4000000, 0x6}}, 0x14) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r9 = getpid() rt_tgsigqueueinfo(r9, r9, 0x16, &(0x7f0000000100)) ptrace(0x10, r9) ptrace$pokeuser(0x6, r9, 0x388, 0xffffffffffffffff) [ 1407.147201][T26038] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 16:07:51 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)) 16:07:51 executing program 4: r0 = socket(0x840000000002, 0x3, 0x200000000000ff) sendmmsg$inet(r0, &(0x7f0000001c00)=[{{&(0x7f0000000200)={0x2, 0x0, @rand_addr=0x1000000}, 0x10, &(0x7f00000012c0)=[{&(0x7f0000000080)="d2f474f2d23e0ee6f7a1ade6de2d762bc2212694", 0x14}], 0x1}}], 0x1, 0x0) 16:07:51 executing program 0: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000001200)=[{0x0, 0x0, 0x3000}, {0x0, 0xff}], 0x2) semop(r0, &(0x7f0000000240), 0x6) semctl$IPC_RMID(r0, 0x0, 0x0) [ 1407.545121][T26153] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1407.627026][T26156] cgroup: fork rejected by pids controller in /syz3 [ 1417.059402][T26173] ================================================================== [ 1417.068624][T26173] BUG: KCSAN: data-race in delete_from_page_cache_batch / page_mapping [ 1417.077230][T26173] [ 1417.079545][T26173] read to 0xffffea0002b029d8 of 8 bytes by task 26171 on cpu 0: [ 1417.087703][T26173] page_mapping+0x185/0x2a0 [ 1417.096034][T26173] page_evictable+0x3a/0x110 [ 1417.100713][T26173] move_pages_to_lru+0xed/0xa40 [ 1417.105914][T26173] shrink_inactive_list+0x4c7/0x920 [ 1417.111116][T26173] shrink_node_memcg+0x55c/0xf80 [ 1417.116182][T26173] shrink_node+0x164/0xb30 [ 1417.120777][T26173] do_try_to_free_pages+0x242/0x940 [ 1417.132486][T26173] try_to_free_mem_cgroup_pages+0x1fd/0x4c0 [ 1417.138625][T26173] reclaim_high.constprop.0+0xf7/0x140 [ 1417.144206][T26173] mem_cgroup_handle_over_high+0x96/0x180 [ 1417.150011][T26173] exit_to_usermode_loop+0x20c/0x2c0 [ 1417.155406][T26173] do_syscall_64+0x353/0x370 [ 1417.159979][T26173] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1417.165871][T26173] [ 1417.168184][T26173] write to 0xffffea0002b029d8 of 8 bytes by task 26173 on cpu 1: [ 1417.175910][T26173] delete_from_page_cache_batch+0x674/0x790 [ 1417.181806][T26173] truncate_inode_pages_range+0x593/0x1120 [ 1417.187819][T26173] truncate_pagecache+0x60/0x80 [ 1417.192675][T26173] ext4_setattr+0xb81/0x15a0 [ 1417.197350][T26173] notify_change+0x7e1/0xaa0 [ 1417.201945][T26173] do_truncate+0xfb/0x180 [ 1417.206726][T26173] path_openat+0x2f48/0x36e0 [ 1417.211308][T26173] do_filp_open+0x11e/0x1b0 [ 1417.215840][T26173] do_sys_open+0x3b3/0x4f0 [ 1417.220265][T26173] __x64_sys_openat+0x62/0x80 [ 1417.224954][T26173] do_syscall_64+0xcc/0x370 [ 1417.229815][T26173] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1417.235886][T26173] [ 1417.238199][T26173] Reported by Kernel Concurrency Sanitizer on: [ 1417.244532][T26173] CPU: 1 PID: 26173 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 1417.252853][T26173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1417.262907][T26173] ================================================================== [ 1417.271247][T26173] Kernel panic - not syncing: panic_on_warn set ... [ 1417.277834][T26173] CPU: 1 PID: 26173 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 1417.286232][T26173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1417.296800][T26173] Call Trace: [ 1417.300126][T26173] dump_stack+0x11d/0x181 [ 1417.304833][T26173] panic+0x210/0x640 [ 1417.308728][T26173] ? vprintk_func+0x8d/0x140 [ 1417.313324][T26173] kcsan_report.cold+0xc/0xd [ 1417.317965][T26173] kcsan_setup_watchpoint+0x3fe/0x460 [ 1417.323450][T26173] __tsan_unaligned_write8+0xc4/0x100 [ 1417.328880][T26173] delete_from_page_cache_batch+0x674/0x790 [ 1417.334837][T26173] ? __read_once_size.constprop.0+0x20/0x20 [ 1417.340739][T26173] truncate_inode_pages_range+0x593/0x1120 [ 1417.346565][T26173] truncate_pagecache+0x60/0x80 [ 1417.351440][T26173] ext4_setattr+0xb81/0x15a0 [ 1417.356029][T26173] ? ext4_journalled_write_end+0xb60/0xb60 [ 1417.361821][T26173] notify_change+0x7e1/0xaa0 [ 1417.366572][T26173] do_truncate+0xfb/0x180 [ 1417.370960][T26173] path_openat+0x2f48/0x36e0 [ 1417.375600][T26173] do_filp_open+0x11e/0x1b0 [ 1417.380206][T26173] ? _raw_spin_unlock+0x4b/0x60 [ 1417.385251][T26173] ? __alloc_fd+0x2ef/0x3b0 [ 1417.390512][T26173] ? get_unused_fd_flags+0x93/0xc0 [ 1417.395635][T26173] do_sys_open+0x3b3/0x4f0 [ 1417.400058][T26173] __x64_sys_openat+0x62/0x80 [ 1417.404755][T26173] do_syscall_64+0xcc/0x370 [ 1417.409254][T26173] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1417.415218][T26173] RIP: 0033:0x45a679 [ 1417.419382][T26173] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1417.439461][T26173] RSP: 002b:00007fc2526d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1417.447883][T26173] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a679 [ 1417.455954][T26173] RDX: 000000000000275a RSI: 0000000020000080 RDI: ffffffffffffff9c [ 1417.464021][T26173] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1417.472194][T26173] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc2526d56d4 [ 1417.480274][T26173] R13: 00000000004c7c7c R14: 00000000004ded08 R15: 00000000ffffffff [ 1418.566750][T26173] Shutting down cpus with NMI [ 1418.573158][T26173] Kernel Offset: disabled [ 1418.577606][T26173] Rebooting in 86400 seconds..