000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4000000000000a12, 0x0) [ 292.403498][ T3193] usb usb3-port1: Cannot enable. Maybe the USB cable is bad? [ 292.742992][ T3193] usb usb3-port1: Cannot enable. Maybe the USB cable is bad? [ 292.759243][ T3193] usb usb3-port1: attempt power cycle [ 293.414297][ T3193] usb usb3-port1: Cannot enable. Maybe the USB cable is bad? [ 293.715742][ T3193] usb usb3-port1: Cannot enable. Maybe the USB cable is bad? [ 293.723551][ T3193] usb usb3-port1: unable to enumerate USB device 17:49:49 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x4000000000000a12, 0x0) 17:49:49 executing program 3: pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(0xffffffffffffffff, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4000000000000a12, 0x0) 17:49:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:49:49 executing program 4: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000003f80)=[{}], 0x1, 0x101, &(0x7f0000004000), 0x8) close_range(r0, 0xffffffffffffffff, 0x0) 17:49:49 executing program 0: r0 = epoll_create1(0x0) close_range(r0, 0xffffffffffffffff, 0x6) 17:49:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:49:49 executing program 3: pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(0xffffffffffffffff, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4000000000000a12, 0x0) 17:49:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x9, 0x3, &(0x7f0000000640)=@framed, &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 295.067453][T14614] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:49:49 executing program 0: lsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 17:49:49 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:50 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x16, &(0x7f0000004c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:50 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x4000000000000a12, 0x0) 17:49:50 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:49:52 executing program 4: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000003f80)=[{}], 0x1, 0x101, &(0x7f0000004000), 0x8) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:49:52 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0xffffffff, 0x0, 0x0, "cfb55e98bb6ed1f5236cfbf42d293da7d58ade"}) 17:49:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:49:52 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:52 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x4000000000000a12, 0x0) 17:49:52 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='hugetlbfs\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x24b6422, &(0x7f0000000180)) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') [ 298.133286][T14655] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:49:52 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:53 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, 0x0, 0x0, 0xffffffffffffffff) 17:49:53 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0), 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:53 executing program 4: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000003f80)=[{}], 0x1, 0x101, &(0x7f0000004000), 0x8) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:49:55 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0), 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:49:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:49:55 executing program 4: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000003f80)=[{}], 0x1, 0x101, &(0x7f0000004000), 0x8) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:49:55 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:55 executing program 0: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="a0", 0x1, 0xfffffffffffffffd) keyctl$update(0x2, r0, &(0x7f0000000180)='u', 0x1) 17:49:55 executing program 0: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="a0", 0x1, 0xfffffffffffffffd) keyctl$update(0x2, r0, &(0x7f0000000180)='u', 0x1) 17:49:55 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0), 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 301.217173][T14700] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:49:56 executing program 0: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="a0", 0x1, 0xfffffffffffffffd) keyctl$update(0x2, r0, &(0x7f0000000180)='u', 0x1) 17:49:56 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:56 executing program 0: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="a0", 0x1, 0xfffffffffffffffd) keyctl$update(0x2, r0, &(0x7f0000000180)='u', 0x1) 17:49:56 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0x17}, 0x40) 17:49:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:49:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x1, &(0x7f0000000640)=@raw=[@jmp], &(0x7f0000000680)='GPL\x00', 0x2, 0x1000, &(0x7f0000001240)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:58 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:58 executing program 4: clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd4, 0xd4, 0x4, [@restrict, @enum, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @ptr, @union={0x0, 0x8, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @func, @int]}, {0x0, [0x0, 0x0]}}, 0x0, 0xf0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:49:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:49:58 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:58 executing program 4: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='>', 0x1, 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) [ 304.240819][T14736] ptrace attach of "/root/syz-executor.4"[14735] was attempted by "/root/syz-executor.4"[14736] 17:49:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000580)={'batadv_slave_0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) 17:49:59 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:49:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:49:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:49:59 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000300)={0x0, 0x1cff, 0x2088}, 0x14) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[], 0xffffff39) splice(r0, 0x0, r2, 0x0, 0xea8, 0x0) 17:49:59 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x560a, &(0x7f0000000040)={0x0, 0x100004, 0x0, 0x0, 0x0, "cfb55e98bbf0d100236cfbf42d293da7d58ade"}) 17:49:59 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:59 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 304.606789][T14767] "struct vt_consize"->v_vlin is ignored. Please report if you need this. [ 304.616040][T14767] "struct vt_consize"->v_clin is ignored. Please report if you need this. 17:49:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:49:59 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:59 executing program 0: clock_gettime(0x0, &(0x7f0000000280)={0x0}) pselect6(0x40, &(0x7f0000000000), &(0x7f00000002c0)={0x6}, 0x0, &(0x7f00000000c0)={r0}, 0x0) 17:49:59 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c60669", 0x8}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:49:59 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x0, 0x0) read$alg(r0, &(0x7f0000000940)=""/205, 0xffffffffffffff68) 17:49:59 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c60669", 0x8}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:00 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/net\x00') 17:50:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:02 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c60669", 0x8}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:02 executing program 0: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r0) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xfffffffffffffffd) 17:50:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000400)) 17:50:02 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}], 0x4, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:02 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}], 0x4, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:02 executing program 4: getgroups(0x8e, 0x0) 17:50:02 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f00000005c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x368048ef], [0xffffff1a, 0x0, 0x0, 0x0, 0x0, 0x17, 0x8, 0x4, 0x8, 0x10000, 0x0, 0x3, 0x0, 0x4, 0x0, 0xa8, 0x2, 0x6, 0x0, 0x7fff, 0x1, 0x9d1]}, 0x45c) 17:50:02 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5", 0xc}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:02 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}], 0x4, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 307.733400][T14822] input: syz0 as /devices/virtual/input/input15 17:50:02 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000480)={0x2}) [ 307.777227][T14828] input: syz0 as /devices/virtual/input/input16 17:50:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:05 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5", 0xc}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:05 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) 17:50:05 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {0x0}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:05 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000540)={@link_local, @local, @val={@void}, {@generic={0x88f8, "144f"}}}, 0x0) 17:50:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:05 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {0x0}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 310.623987][T14854] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:50:05 executing program 4: pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/full\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0xffffffffffffffff) 17:50:05 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5", 0xc}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:05 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/full\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xa, 0xffffffffffffffff) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x6000) 17:50:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$unix(r0, &(0x7f0000001080)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x1, 0x0) 17:50:05 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {0x0}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:08 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af98", 0xe}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:08 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:08 executing program 0: pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 17:50:08 executing program 4: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000180)={0x1, "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"}, 0x401, 0x800) 17:50:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:08 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af98", 0xe}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private1}, 0x1c) 17:50:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x58, 0x0, 0x9, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x24, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}]}, 0x58}}, 0x0) 17:50:08 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:08 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af98", 0xe}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 314.005914][T14909] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 17:50:08 executing program 0: pselect6(0x40, &(0x7f00000002c0), &(0x7f0000000300)={0x6}, &(0x7f0000000340)={0x5}, 0x0, 0x0) [ 314.047066][T14909] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 17:50:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 17:50:08 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:08 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000280), 0xc) 17:50:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:09 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e", 0xf}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 17:50:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x11, 0x0, &(0x7f0000000000)) 17:50:09 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f5288", 0x1e}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:09 executing program 4: openat$full(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) 17:50:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 17:50:09 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 17:50:09 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f5288", 0x1e}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:09 executing program 0: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x3}, 0x8, 0x0) 17:50:09 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e", 0xf}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 314.595978][T14954] input: syz0 as /devices/virtual/input/input17 [ 314.644826][T14963] input: syz0 as /devices/virtual/input/input18 17:50:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:09 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f5288", 0x1e}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:09 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e", 0xf}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:09 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) 17:50:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(r0, &(0x7f0000001080)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x1, 0x0) 17:50:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 315.100512][T14987] input: syz0 as /devices/virtual/input/input19 17:50:09 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:09 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d", 0x2d}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 315.150922][T14994] input: syz0 as /devices/virtual/input/input20 17:50:09 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="fd", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c) 17:50:10 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000300)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6d]}}]}) 17:50:10 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 315.416959][T15016] ptrace attach of "/root/syz-executor.1"[15013] was attempted by "/root/syz-executor.1"[15016] 17:50:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:10 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000140)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00'}}, 0x119) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 17:50:10 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:10 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d", 0x2d}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:10 executing program 0: shmget(0x1, 0x4000, 0x78000620, &(0x7f0000ffc000/0x4000)=nil) 17:50:10 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:10 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 315.758230][T15035] ptrace attach of "/root/syz-executor.1"[15031] was attempted by "/root/syz-executor.1"[15035] [ 315.762396][ T2989] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 17:50:10 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d", 0x2d}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:10 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:10 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self\x00', 0xa35a459f75292b7b, 0x0) [ 315.835380][ T2989] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz1 17:50:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 315.922873][ T2989] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 315.942842][T15053] ptrace attach of "/root/syz-executor.1"[15050] was attempted by "/root/syz-executor.1"[15053] [ 315.958604][ T2989] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz1 17:50:10 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(r0, &(0x7f0000001080)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 17:50:11 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f", 0x35}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x2, 0x4e1c, @remote}, 0x80) 17:50:11 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:11 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000100)={'security\x00'}, &(0x7f0000000180)=0x54) 17:50:11 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f", 0x35}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:11 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 17:50:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:11 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(0xffffffffffffffff, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:11 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) lchown(&(0x7f00000000c0)='./file0\x00', 0xee01, 0x0) openat$incfs(r0, &(0x7f0000000040)='.pending_reads\x00', 0xc0, 0x0) 17:50:11 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f", 0x35}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:11 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x26f06d12, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 17:50:11 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(0xffffffffffffffff, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:11 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(0xffffffffffffffff, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:11 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43ac", 0x39}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x80) sendto$inet6(r0, 0x0, 0x0, 0x815, 0x0, 0x0) 17:50:11 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x0, 0x7fffffff}) [ 317.142063][T15125] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 17:50:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:12 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:12 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43ac", 0x39}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:12 executing program 0: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xc, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 17:50:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x80) bind$inet6(r0, 0x0, 0x0) 17:50:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:12 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000780)={0x1f, 0x4, @fixed, 0x0, 0x2}, 0xe) 17:50:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:50:12 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:12 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43ac", 0x39}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 317.880253][T15161] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 17:50:12 executing program 0: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xc, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) 17:50:12 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000)=0x2f, 0x4) 17:50:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:13 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:13 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474", 0x3b}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:13 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000540)={'syz0\x00', {0x85, 0x4, 0x4, 0x400}, 0x2d, [0x4, 0x6, 0x2, 0x3, 0x1, 0x1, 0xf554, 0x0, 0x9, 0x80000001, 0x2, 0x5, 0x29b, 0x5, 0xff, 0x9, 0x8, 0x20, 0x3, 0x6, 0x4, 0x6, 0x0, 0x8001, 0x2, 0x9, 0x800, 0x80, 0xffffcee7, 0x2, 0x9, 0x7fff, 0x1f, 0x4, 0xd8ec, 0xc7f, 0x8, 0x9, 0xe00, 0x3, 0x6, 0x2, 0x31, 0x5, 0x7fff, 0x5, 0x2, 0xa45b, 0x9d00000, 0x1, 0x3, 0x3, 0x7f, 0x1, 0x0, 0x8, 0xe7fa, 0x9, 0x7, 0x1, 0x1, 0x9, 0x1, 0x8], [0x101, 0x89fa, 0x20, 0x0, 0x10000, 0x9, 0x1, 0x5a56, 0x6, 0x5, 0x8, 0x4, 0x6, 0x9, 0xd64, 0x1, 0x8162, 0xa6, 0x9, 0x0, 0x3, 0xae, 0x20, 0x749, 0x299a, 0x7b, 0xe199, 0x9, 0x58, 0x8, 0x8, 0x0, 0x38, 0x1, 0x3, 0x0, 0x1, 0x1, 0x7, 0x5, 0x9, 0x8, 0x7, 0x527, 0x5, 0xffffff7f, 0x10000, 0x10001, 0x3, 0xe710, 0x1d5a50a3, 0x7fffffff, 0x2, 0xc30, 0x9, 0x10001, 0x3, 0x10001, 0x6, 0x7f, 0x3, 0xc2e5, 0x7ff, 0x9a], [0x75a4, 0x7fff, 0x9, 0x9, 0x8, 0x8, 0x4, 0xffff0001, 0xfffff800, 0x80000001, 0xb4, 0x80000001, 0x800, 0x0, 0x6, 0xe2, 0x1f, 0x1, 0x7, 0x5, 0x4, 0xb34, 0x8, 0x80000001, 0xdc, 0x9, 0x8f6, 0x1, 0x7fffffff, 0x8ff, 0x10000, 0xef, 0x1, 0x5, 0x5, 0x9, 0x6, 0x7, 0x20, 0x0, 0x2a, 0x0, 0x6, 0x5, 0x8000, 0x9, 0x1, 0x0, 0xba2f, 0x2, 0x6, 0x0, 0x9, 0x7, 0x9, 0x20, 0x5, 0x6, 0xcf4, 0x8, 0x3, 0x200, 0xfffffff8, 0x34], [0x5, 0x1, 0x4, 0x6, 0x7, 0x0, 0x56d, 0x3, 0xffff0000, 0x10000, 0x40, 0x6, 0x800, 0x3, 0x0, 0xd8c, 0xfffffc00, 0x2, 0x8001, 0x6, 0x1, 0x8, 0x7, 0x82, 0x3, 0x7fff, 0xffffffff, 0x7fffffff, 0xb49, 0x3, 0x9, 0xd, 0x9, 0x8, 0x1, 0x4, 0x16ee, 0x5, 0x2, 0x4, 0x5, 0x8001, 0x4, 0xff, 0x1, 0x7fff, 0x20d36e9, 0x7, 0x200, 0x3, 0x7, 0x2, 0x3, 0x8, 0xfffffff7, 0x5, 0x80000000, 0x80000001, 0x550b0f5, 0x1, 0x8, 0xff, 0x80000001, 0x422f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f00000009c0)=0x1ff, &(0x7f0000000a00)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x2) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz0\x00'}, 0x45c) 17:50:13 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000000), 0x4) [ 318.545028][T15192] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 17:50:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:15 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0), 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:15 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@srh, 0x8) 17:50:15 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20008001, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) 17:50:15 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474", 0x3b}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:15 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0), 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:15 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000740)={@local, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x20}, 0x20) [ 320.801432][T15210] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 17:50:15 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz0\x00', {}, 0xfffffffe}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 17:50:15 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474", 0x3b}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:15 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB=':A'], 0x8) 17:50:15 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0), 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 320.959271][T15226] input input25: cannot allocate more than FF_MAX_EFFECTS effects [ 320.992788][T15228] input input26: cannot allocate more than FF_MAX_EFFECTS effects 17:50:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) 17:50:18 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x4, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:18 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac6", 0x80) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:18 executing program 4: msgrcv(0x0, 0x0, 0x0, 0x0, 0x7000) 17:50:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:18 executing program 4: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x3, 0x0, 0x0, 0x7}, &(0x7f0000000080)={0x5, 0x8, 0x4, 0x0, 0x8}, &(0x7f0000000100)={r0, r1+60000000}, 0x0) [ 323.875827][T15247] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 17:50:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x8, 0x0, 0x0) 17:50:18 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac6", 0x80) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:18 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x4, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)={0xec4, 0xd, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x630, 0x3, 0x0, 0x1, [{0x1a4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x2c, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_DATA={0x40, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_KEY={0x10c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4d, 0x1, "4d51aefab2e03e64e33425f7ce3d07cbd55dd5646aa274d0873cd8428f08ca31fa186c2f2c6f0573eb89b31112881dbb936080b314e1ddff406814d2dbb26215577c01b9f119b4a22c"}, @NFTA_DATA_VERDICT={0x70, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_TIMEOUT={0xc}]}, {0x444, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x440, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0xed, 0x1, "a4a4d2bf221439a33353d2f60bff4de534c3e17074fa3673860aaf743f2dd4c1f767ab4e7ad256900abf7a7584d47d582dbcbe83a0d36a405de8c3ebb7780dc01956c380caa92f960957494b85f45f2be9c504f9b066b05b1d2f5297d6fdc3255c575720b321b873b8d69d89e274209e3b24c5af64b0b402fe4b5b6d8b390772748c8a74c83eb83bc10807e5c7c74fa51a16692c5b2cc349c1343a87ca7c4acc0bae01b9f80795ad366e97137e71aece5242d1bfb827febfbc8500f92d0e03f2c7a84bc578c7b8148a1d0cc8142081b20960ddae893d724c244d719c1f10d278371f5fec24962c9c94"}, @NFTA_DATA_VALUE={0xe9, 0x1, "2c7b971b1a079f52de7ba6132931a7b9f5d0314d5edfad648ff50cf80a9d43ba77d1261d0597542b8438d2f20408188ff4c84a508261d65f8b6d409273b0d18297ea9ce9657390c08d793e84aa513de357e244f1a0e40a0c0e4ba94adbe8e9c7eda74e23a2ec7f1a95812bbf91d2939c005e5aa6a4a9cfaed499b21db9d2afd9425ea607fa2285c91a5777ced29845cec9103da586a2e1f86a274134f39199d9d9d8c2d5a9c9ad0f40a427c174a39c9d58fd2f20067ebab1f8af61d99be15ba4c6afd93d0b059f5e062de678a694e52be65c1caaade674f87fe5140c4a245fc8f9f9416134"}, @NFTA_DATA_VALUE={0xfd, 0x1, "91a857444c6d7145eb90994750af3f35590c652f28b1e9824e8841917cdc54be9ff37f81cae8a346e9ec782eb8c0a6f97c927f4ef7ece7ba677ed88fce53160a071517296094510db8eeba664ac5d1c561197bc83aff2d04f7969413db390657a788ede1e7fccbd1eb86ab6bf36cfb7da0b6d601dcfb8717b0c2f944af419f7c40e6e736ac226a2f9316e7b58d1c8bda34d100675ef8c605f41e7c263edf592c923ea62c32701b648a9bf6ef09783f3ab98a10538ee2660025504c108e747e8b807985f904c39ec7cf592f5e6b5dd379584ba060c3b5548641b99f7325b185ff637d567c4302d39fec6fb65461057842e532ceec9d5ae9a61f"}, @NFTA_DATA_VALUE={0xf1, 0x1, "1bf212ecaf6d130faa8d9058542f8f3a38805c24a211571c72fee3982ef4861ed649d87d14fd7af4bb4206b04051396255b8cd0282739290ef0b62b4304342deb3c191b30101014dc569f1bb4bdbf2a087a72726eaa198b3b0f9dd84e602df0645eb7da0ebd31c38dc831c674f3f80e5a7d6496e195d7e18e6d88ad98ae69a7f24ae486fccd20e49e6f65e268839bc39a91983a05f08d33f6fc6e8426cee600f90e34d60f42fa8484966cb7e07947f71ccdd63c13d17cf5a81d71a5b836847fdea8cf66d6835d2d406e4305d5a5c38be5a73694173a053e740b44e73c5e0971d644cece8a1be1d5bf92f116773"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}]}, {0x44, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x874, 0x3, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x854, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_KEY={0x100, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xe5, 0x1, "2c943f859b56ca390200c401d351b9914b8d93fbb72e9667b9bac8b164cfedf4db4fc641bf30ad01f459e1f85d814f8c31c02571a95e159af45cad40dffbde59419ad71854ca44a83ae3a0450882864fef64c59ea162f84964bce984c8dd740c9cfbb4ff405ba0ed960b827b579b0401e26c7152364c53469984225018ab37a6526504607e773f890af64d9369b8614249eb138dd5ea7e8e7a63db25c09510fd03d301f65b3384f08927f7b912a3990bf7cccfa9fb7d7dbd32f4c6b8db902cba426455c2360f20bf469776a46f7635c7bce67a963bb88a9542c8365cb5faac9074"}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_KEY_END={0x4}, @NFTA_SET_ELEM_USERDATA={0x69, 0x6, 0x1, 0x0, "ab439177e18d1504ff1d8fe9f7529dd93ecb92efcf648782fcd42941558d6a309769067f32a21f1ac9e77cd76e69e51b4e99a70adad5e268526c370511ee4a49e8b72c39305d474b1ed92741ae62c3e3a12752ca78cfe10d6de96f8874e6112fcb57ada3df"}, @NFTA_SET_ELEM_USERDATA={0xa5, 0x6, 0x1, 0x0, "ce82e1baa9c1d67a49639907f262f1fc559f964183efe2ce891b96b3cc26c432e1c33fb55759647724aec53cca8a46d69f844253b4614e69c0561ef06d36c22d745f9ca624437167ab0886697aa215311c95e31e3bda8eedf6c94204399210a427d48da8fba84f653916a747e1a0903255c23b50877042387f5c238a0006eae620cc278a59f7aac3602bb3e4475c693cef8a89d241bd41967796176ba06fba6ed1"}, @NFTA_SET_ELEM_DATA={0x120, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xcd, 0x1, "7237cf98d3944b86b8cd08d1c54fc0bb985423531a77e6182bdacb89712c79a96ca3d3af076dd458726177474b6dfab7ff94809757629b12e7a556b49ef40b2c78b219addd042dfce5a1eb549dca887358fa7d6b3fa37c79e885205e07afd0e441fd8f1864ff2fe3ae02a2ced8cab32638b38762a6b3b43135e09c22ad85faf0f566fddc87ab08e8ef3af9aa80a734142b2e4fe477027d8cb7704bd3329eca2a8c68ebc16ed0008a3d30c6ecbf470c884be614676769e92ab8c0fdde06a201e9579f9671229e1417b3"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_DATA={0x50c, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xe1, 0x1, "c881046586c0fb502f9dc8648fde48aed836c7bc9cbb7b7fc2f9b6403f5c0e5122e6e755c9252e1312b4addfd026c94755781d3742b4f90b4a079c10ff7add6bc87891bbb8254c8547823cd3f8aad314e2ef05520127c99acbbed5fe814a1a7e7d560d7da4bb33059270b89951f0fd9ce86219cc7ff5d018ca1ca8ab3f4a8faa0f4104727a62b4a1fe9ab7c3cb893148e364132bb7220478f3620db944508aa94c13aa0f50584effea3de26906feaa6d199a8e87fa9d56cd0f1bd1783462536b7017691a91942d4273d7a353a34a93f42c1a540cbf1704db5750027d40"}, @NFTA_DATA_VERDICT={0x74, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x3ad, 0x1, "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"}]}]}]}]}, 0xec4}}, 0x0) 17:50:18 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x4, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:21 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac6", 0x80) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:21 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000004c0)={'sit0\x00', &(0x7f0000000440)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @local}}) 17:50:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:21 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {0x0}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) 17:50:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:21 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000000c0)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77c4f5a9"}, 0x0, 0x0, @fd}) [ 326.956758][T15283] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 17:50:21 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000780)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SYNTH_ID(r0, 0xc08c5114, 0x0) 17:50:21 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {0x0}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:21 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811f", 0xc0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:21 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811f", 0xc0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:21 executing program 0: r0 = mq_open(&(0x7f0000000140)='*\x00', 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 17:50:21 executing program 4: clock_adjtime(0x0, &(0x7f0000000000)={0x6}) 17:50:21 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {0x0}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:24 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x240002) socket$inet_udp(0x2, 0x2, 0x0) syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000580)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 17:50:24 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811f", 0xc0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) 17:50:24 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d0000"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:24 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:24 executing program 0: syz_io_uring_setup(0x6214, &(0x7f0000000000), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 330.039190][T15325] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 17:50:24 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd", 0xe0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:24 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:24 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x4, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:24 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd", 0xe0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:27 executing program 0: mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000000c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) 17:50:27 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x4, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:27 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd", 0xe0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f0000019880)=ANY=[@ANYBLOB="7f"], 0x6b1) 17:50:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d0000"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:27 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814", 0xf0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:27 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, 0x0) [ 333.118361][T15368] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 17:50:27 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x4, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) 17:50:27 executing program 0: socket(0x28, 0x0, 0x2) 17:50:28 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {0x0}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:30 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814", 0xf0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000004c0)=ANY=[], 0x24}}, 0x0) 17:50:30 executing program 0: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, 0x0) syz_mount_image$zonefs(&(0x7f00000003c0)='zonefs\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000680)={[{@explicit_open='explicit-open'}]}) 17:50:30 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {0x0}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d0000"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:30 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {0x0}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 336.167391][T15405] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 17:50:30 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmsg$qrtr(r0, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x38, 0x0) 17:50:30 executing program 4: openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:50:30 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814", 0xf0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:31 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:31 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x143243, 0x0) 17:50:33 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5", 0xf8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:33 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmsg$qrtr(r0, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x38, 0x0) 17:50:33 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:33 executing program 4: syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x240002) 17:50:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000002480)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1274, 0x0) 17:50:34 executing program 0: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000100)) [ 339.286614][T15443] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 339.308973][T15443] device syz_tun entered promiscuous mode 17:50:34 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5", 0xf8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:34 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 339.337855][T15443] device macsec1 entered promiscuous mode 17:50:34 executing program 4: mount$9p_fd(0x0, &(0x7f0000000780)='.\x00', &(0x7f00000007c0)='9p\x00', 0x0, &(0x7f0000000000)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 17:50:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x1, 0x1, &(0x7f0000000040)=@raw=[@call], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:50:34 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5", 0xf8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 339.595063][T15464] 9pnet: Insufficient options for proto=fd [ 339.619669][T15464] 9pnet: Insufficient options for proto=fd 17:50:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:36 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec379", 0x32}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:36 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0xfc) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x4020940d, &(0x7f0000000400)={'batadv0\x00'}) 17:50:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x58}}, 0x0) 17:50:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:37 executing program 0: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, 0x0) 17:50:37 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$inet(0x2, 0x0, 0x4f0ac4e5) pipe(&(0x7f0000000280)) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$CHAR_RAW_FLSBUF(0xffffffffffffffff, 0x1261, 0x0) [ 342.349792][T15482] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:50:37 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec379", 0x32}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:37 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0xfc) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:37 executing program 0: syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00') 17:50:37 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0xfc) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:40 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec379", 0x32}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:40 executing program 4: r0 = syz_open_dev$char_raw(&(0x7f00000002c0)='/dev/raw/raw#\x00', 0x1, 0x19d800) ioctl$CHAR_RAW_HDIO_GETGEO(r0, 0x301, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={0x0}, 0x10) name_to_handle_at(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x53, 0x6, "b65f3e1d589ff0df2b067055bca0a5bdd68c8ae82cefac65b8d008603d7f642d192b7a127f72e659a22cc16679be6d07bc7a238498c6c64279a12a17c9de65391a7b7290f0baa68d61d7f3"}, &(0x7f0000000480), 0x0) ioctl$CHAR_RAW_BSZSET(r0, 0x40081271, &(0x7f0000000500)=0xfff) syz_mount_image$qnx4(&(0x7f0000000540)='qnx4\x00', &(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f00000006c0)=[{&(0x7f00000005c0)="ef6f891114e7097dad60aa1fa700943dff44839cafd4fb7a45d8ec00236bccc79d6f3bd10ce9342de37dbe3b751c2102bba3a56fabf92b246f180202b2f660f60c1597130942aaa9c735977f0e9d71f0e22e9981f72c5ba85a60510e92fc", 0x5e, 0x2}], 0x0, &(0x7f0000000700)={[{'#]\x90l'}, {}, {'/dev/raw/raw#\x00'}, {'((1][^-,'}, {'/dev/raw/raw#\x00'}, {'syz1\x00'}, {'\''}, {}], [{@audit='audit'}]}) socket$nl_xfrm(0x10, 0x3, 0x6) 17:50:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f0000019880)=ANY=[], 0x6b1) 17:50:40 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0xfe) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:40 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2", 0x4b}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 345.376651][T15518] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 345.391256][T15523] loop4: detected capacity change from 264192 to 0 17:50:40 executing program 0: r0 = socket(0x1, 0x5, 0x0) getsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, 0x0, 0x0) 17:50:40 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0xfe) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 345.466873][T15523] qnx4: no qnx4 filesystem (no root dir). 17:50:40 executing program 0: mmap$usbmon(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 17:50:40 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x127a00, 0x0) 17:50:40 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2", 0x4b}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:40 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0xfe) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:43 executing program 0: openat$full(0xffffffffffffff9c, 0x0, 0x434300, 0x0) 17:50:43 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0xff) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:43 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2", 0x4b}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:43 executing program 4: msgsnd(0x0, &(0x7f00000000c0), 0x8, 0x0) 17:50:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b5800"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:43 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0xff) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 348.434329][T15565] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:50:43 executing program 0: mount$9p_fd(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd', @ANYBLOB=',access=user,version=9p2000.u', @ANYBLOB=',version=9']) 17:50:43 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903b", 0x57}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x33c, 0x114, 0x8, 0x8, 0x1}, 0x40) 17:50:43 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0xff) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 348.608779][T15584] 9pnet: Unknown protocol version 9 [ 348.641170][T15584] 9pnet: Unknown protocol version 9 17:50:43 executing program 0: write$hidraw(0xffffffffffffffff, 0x0, 0x0) 17:50:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:46 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903b", 0x57}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8921, &(0x7f0000000400)={'batadv0\x00'}) 17:50:46 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x1b}, 0x40) 17:50:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b5800"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:46 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:46 executing program 0: syz_io_uring_setup(0x2a08, &(0x7f0000001680)={0x0, 0x0, 0x2f}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001700), &(0x7f0000001740)) 17:50:46 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc050565d, 0x0) [ 351.499316][T15609] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:50:46 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903b", 0x57}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:46 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:46 executing program 0: socketpair(0x1, 0x0, 0x7ff, &(0x7f0000000a00)) 17:50:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:49 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031", 0x5d}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000100)=""/236, 0x1a, 0xec, 0x1}, 0x20) 17:50:49 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x1}, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, r1}}, 0x48) 17:50:49 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b5800"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:49 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:49 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031", 0x5d}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 354.534063][T15645] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:50:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01"], 0x14}}, 0x0) 17:50:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4}, 0x40) 17:50:49 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031", 0x5d}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:49 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 17:50:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8924, &(0x7f0000000580)={'vxcan1\x00'}) 17:50:52 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:52 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f3", 0x60}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000002380)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000002340)={&(0x7f0000001000)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x30, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}, @TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_MEDIA={0x98, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @remote}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}]}, @TIPC_NLA_NODE={0xd04, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ID={0xcf5, 0x3, "5708b94c98941d07f329e34611b0544c9f982043f1cb5d7e772bc1c19ae12074ae745209c3ea97f7512a5a2017fba95b03b168b1924bfeaf8dfa3a49bb6f42ccad0ece6e959221a3442131b89b2fd507fb304d4f6f63d3fc48424ae59176e980c163523943cf767eee8c8fe5ec922d903ac305898fc7da0aa877405ea31a0f4d7e446878ccf4b011c34360ba5af21c2a47df5ba86614936eb8505ca681da72aecb5b18a661573df206eacccbb5f7b1cc29e098a2e63f99e7c9eac94d7ce0e889d81103fb4f94e144a36dad52d7b9e553a83966c3388d1e5eb0de36f9c177d94058eba91d4b3a5c8659a1f389f62dc64fc9c5fb183af992ecd0974138bc3ea245b8085977dc7216d27ea773bb2ee1218edd6aa6a945227d0c26d6fab52251bf29058abe165353153ef9e6be1f51f61c6da7e4c53e56d6d00f7490cd4e733d26011b461b1ca3b0229208bd5fe2eaa4ff393f938708144f26a60b1a141c16d45098b60bc40b507732c161e5dbef2690f9e4b2225e82118ca351fd8d8d3f928f643254d81a0883683c09bc4d46fbaa282499830df901a2b4d5743ece72768568f7ebbebb9da273d414c6578907ef8ac6e5bacfb49bf647f16a76073c8c404d010c9f7eda8aaaa8ec2f292d4ccfc9742729ee9121376c767a7d8d85728ce379373b80eb026ed9e1afdd8ba10a44d2ee1a0aeeefbcb11a65424c8924d32f45ca21e2aed418428bd99cae00b1c20762dcfea207d939724b1c0a5f95845e835662130ef160adae06a11856eefba4b2640f11bf6adb3af30e0315c3f3002d0be3ecbaec43bb193c7b09043e367f04660fc3d4119153260345ac353c0defeb75263dad4f5742f8e0209d32561acfef6125cd6a20ef30d64fb5d6aef6aaec22a676d14704a758042b226ca883f57b57aea43a3ceb67e3bd8aad548218ca04f697016becf4d1a8527b8e93c4581a9570870ea65a6ff21c0c0a0d0646d05d09a26e99667447a61d21eedfc5bd6f5802972278d27a91476383631a7283f6d7a16daa73e48375a732f99a0460268b41d1e52de7d69662835f46abd4ed751e96dbfdb0c6ac61c9d64a07621272a2345374f09ee53d7cee0c8e6cbb28ca728477ea7b0f8443c5887b19dc34c1e0fd4e030332b15a104767b62ac771e694c07606cc319d73dbe952185585573e495f9c1c95f3b60211b20ab608b63177759cf00ecec13d224d6519c99aad9ee0b8c307bab563a6a4075f3b2dc2e8a125421b3e7df0c9a483768c94257aeeeda208ebecef91ab41f76cedb4ac8c1e4382f83cb7f88648a622e1613e06aeffd92e5d7614218763d981a66a263365305b90ddba6a6334aa8c9de2f6f226fee0175b8438083142e49195295f59f9c87ca4ff6c690e6ce58fd6b50737ace61f7e8be782ae8cb325e769549b081df8b42bfa3db8359aca10435cb24fcd81203efce91ea8023b751fe3ed3b8c921b988be6fea903dc193c900031ebe6491c6ce719176414fa9cb1c4ba4583ab6db3199d5148aa3b5e8ad4768f152a924bc753b999a05296714b181011048c8ee6d841d4079fbd8195e9c0efc5398123f460decf4a420b14239ca2d0d5241921f06df2030cf9baea18588c1938b908b815509bdb70ee433e98093a22a32db49536f770606efdf0b8cbdeed1d9c8f2db2593170c6c8994d86377337fdec5769f6f2f3922db24486639a84040cfd89162ef6c2682c4550f8c234d43a5295cf590703e622fc4d95ed097be3f454e85a62dc2d07b1fef49e10a8f05e8ac4933411f1f29e8fa3aa2bdf6a9b7990aabce9d44090dac64a30ba8e01104f303a9752020cbfc09d2d4909ef65795f44178e7c53afd43939ba7ac6c36672341cd3b278046678907ff04a3389e70bd23d1e6e2d29072014e5123755a8d1c79f5cbaa477ebc0f5ce279a656e8ec8b4082716c1d7b1ed57bd23493619125fb6e95db18eab76fd1200ef4b8a730d7d989b861de05968dfa96c86cf37cedab7391b5bbecb93c9501fcc7b634c578303b59fd56bbf17099ee74e4df5b8ad464f54e874e0d49ea0e0bc0f3a27f83f0ee9774641f93a0fa5cf0fbc8d40cb92fd496b543967b2a1907569248451ce6b931301b1c504f71946e69c296011eaf09ed8f66b74a095dfc75090da94d04176974d60e8e5d26ab5167230f94d8f7dd888567fbc00f3833e8f3f67c440f6a5c098486c7484dac73435f8ffe5be7d44a58e286daba129a824a5b308ce02b55e79332d75df1aacaa67803b125eb0fd7c32b63873bff82488c2c8322518c9110d750ede6c92afa01656c6b842150d24848417900429280b04fc644309f0480a47e01dee79f2795de37a92c0197fe70863ee88071a495f40626404d692c309d717e20a38420d92ebd4f5261518738615049fedf54fcdb0e66f4ca5ef7628225495752edc3815d7391a55c295419bde8569035332851a17171e5430963c02bf9a39857d15a2f76e7221bb59a6c605fff54011a92c1c3bd36931acaf7cde0c8acf0edaa96ab7e388102fc392208101a05c6a8ffccfc197e5d12ad4ab0966c226ffd3033c22da83c8fd7d996d8602cff085479d82cc1da6c71aaa213c38de21e20c1332ae0a0c62ff89840b00d3bbbaccf6546f22238bffa4aee0bb5973daa2015a295c9c51b10369b50d5c03590ceb62f9cb9b761f2d9ccc46f219638579df43562d74e990f04941b68757ac387d42abc2d00b46902395c62cd5e8e00a509970323bedd693da5768ce6e8c6b25ea78d6412cbfb4d1d89ec83662bfb61be43f0deb839267a2fd77e471bd203afdac9a71596ea7d5e4c595c765e49153d49630e769f87681ecce0c38f7708733da02c2d1f768133cb731feb63906eb0b797342694b4dc3155eccf2a693803b4a96ca2b01427c552afd522bc45cafcfa34f30bb28989c79787415029120e0d0a3bbc5f302f292d14da77713eb7b9f0d0fd7aa8721bef0dbb0837de3aabf34f007d8623f33ccfdb10aa575800294694b5b91ad4f8a0e6cecbd820c71d20e64f62e8a6c27317f32b1b21b0db2f7ecf39d9b6b1d4ce208b963e4e394b276947b2711636b375d87fbbc9c573b9172eada2d0bb4067ff8093c0338bc6f3e4170945523f3690097ec65f2254953d27cf19136be903db489e3b63a9e2063883ede8c2978f831f163916f9a236ccc2582e86e216443edf5a4b8398b964ed73ff3abe076516c547e384a58807e9b352e4c9a5b755dc69e0c99e8da724c7fc5c3e98a2f2c0123ecf9576dea3bb8642c7cd816e0252ac1bfed7f97b8ab3262132a65dfb27164e4ea0e40919bf0abfd8e2c1aaf741166dfbd858d3c770fe6ef9fe6860d36f9b4d6dca97c61cf9908cdbf504cdc6ce36ce5e4ec0e42a7a61cc289fd913157fc6cdc924eacf49d69bb7e1af242fde310ff944c932705826ed48d9fd6af748660239e3a0dd22aa53c30028a5bcc21b5b760f0844d4470b9aac6a9ba3a1bf6f5db01c76fd2764c795e27c4bc13ec222ceec9fe966b5bc0490143d74dbc888a4d9490ca7ca0ad557f2d5accbc30ce30f7f0aff1d874489105592b13b50ddc0a401a5ae18698b775c47f1bbae49d6bc993c081a206c4b074372e1458f39efcbb26c79b483e744dc6a88e44251d8df94c4ae647e563fae4db0052ddb6dc11ed96371a23d75b3046ed3e8d8ff8f8db9049700546fa14d17838081cdc7a0ac6248b36a8ec69a18e7cf550b4c718ed55208cf94172271846f4ca24e5f8d4bf65e4cd17b6793710e62f8b97d1a36eee4e5a4001fb4b9c98bae6496d15ddd081ab1223cd86cbc5884f85b9d7d0164ba18b514f829538ce255cccc20556bfade6351b0011bc8fc230b71a4122c4503c29bccf8542506caf17fae1e33836e033358e2250195b783525c8ea8d72fc1d518944a87b27e900ad175fa867b96411ee7e33c4495809531a2935fc444ea2b066a528f7b7384ccf60617ea2f478fc3c8bf8250e001fb7b3eaa29db016665d77672b708f8df1e558d9fcc858040146aea7ad5c6c8675c3de78d7c68c547624beaadc5ef95bb89b5e10cc00e97f78d4dc6637ec8670c0c2729a784d1cd0b987b812a857618000936e8a753b7757689d338cdbd7e04fb8fa655f2170b3df05dd492550987cc4f342783824907de736c934b799532e0cb266df36abd94c823a19136bfd9b5a87343465894b158cfdc9bdc0b53227998748366b1577a2bd9c5c0e247ffe321287e47ea274af3ff9c1e73e87da3abbee2682af2dfefdc3ef7e4cf4b5fa25788c056118efc5c94dce6dfc4689bd2739b82edc4b873bbae9894ea3e9669b494b547a01b8fad8686da6b6ef144b6aa1c11fec923a133e33d8ca1c529fc1f89ee5483beee8b54a55fe5efa18a934c523b3fadd2281afd579aa1dd7315b126ad87c8d637724b4b7ec1f5791ada13773b7b9693a75127de4a98475adff948fc104a3b519304164785e29c154fecedfabb1a51288479cdcacfec20220e5acc25119d5232a35ffe0c85a054bb431e39425363d2eb3de161ad4696a7ebc75c5c12d92299c9e11f861f4082312559e17941d322126912f209d0718c80bdcb190d6ae0b52b392c9bb5e845b6c6ce28155e2e3e4e2ff2a3e5db5b35adecb91938bad752994fcef21cd4cc6b9e40d5d942ac436a6389b598b2cde77144f06a53d13922a4879883bc41419ac9787ac8f"}]}]}, 0xec4}}, 0x0) 17:50:52 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f3", 0x60}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 357.643616][T15686] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:50:52 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', 0x0}) 17:50:52 executing program 0: prctl$PR_MCE_KILL(0x2a, 0x0, 0x2) 17:50:52 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440), 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:52 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440), 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x5460, 0x0) 17:50:52 executing program 4: prctl$PR_MCE_KILL(0x23, 0x0, 0x0) 17:50:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:55 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f3", 0x60}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:55 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440), 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:55 executing program 0: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0xffffffffffffffff) 17:50:55 executing program 4: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x107002, 0x0) 17:50:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 17:50:55 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae", 0x62}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:55 executing program 4: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) 17:50:55 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 360.732405][T15724] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:50:55 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', 0x0}) 17:50:55 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae", 0x62}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:58 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:58 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x106}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 17:50:58 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae", 0x62}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 17:50:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 17:50:58 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x4, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:58 executing program 4: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000ac0)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={0x0}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001180)={0x24, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_MON={0x4}]}, 0x24}}, 0x0) [ 363.786524][T15763] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:50:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:58 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:58 executing program 0: mount$9p_fd(0x0, 0x0, &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) 17:50:58 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x4, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x3}]}}, &(0x7f0000000100)=""/236, 0x26, 0xec, 0x1}, 0x20) 17:50:58 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/12, 0xc) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:59 executing program 0: socketpair(0x18, 0x0, 0x3, &(0x7f0000000100)) 17:50:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:59 executing program 4: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) 17:50:59 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x4, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:59 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/12, 0xc) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:59 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {0x0}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 364.538073][T15818] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:50:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', 0x0}) 17:50:59 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/12, 0xc) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:59 executing program 0: prctl$PR_MCE_KILL(0x18, 0x0, 0x0) 17:50:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:50:59 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {0x0}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8932, &(0x7f0000000080)={'sit0\x00', 0x0}) 17:50:59 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/14, 0xe) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:50:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000c40)={0x14, 0x6, 0x6, 0x101}, 0x14}}, 0x0) 17:50:59 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x64, 0x1, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8}, @NFCTH_STATUS={0x8}, @NFCTH_TUPLE={0x2c, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @NFCTH_STATUS={0x8}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x64}}, 0x8000) 17:50:59 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {0x0}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:00 executing program 4: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) [ 365.273799][T15854] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:51:00 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/14, 0xe) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 365.320134][T15859] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 365.377581][T15859] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 17:51:00 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 365.423922][T15869] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 365.472531][T15869] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 17:51:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:02 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/14, 0xe) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:02 executing program 4: rt_sigaction(0x19, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000580)) 17:51:02 executing program 0: bpf$BPF_BTF_LOAD(0x8, 0x0, 0x0) 17:51:02 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:02 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x20, 0x1, 0x7, 0x401, 0x0, 0x0, {}, [@NFACCT_NAME={0x10, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 17:51:02 executing program 4: syz_genetlink_get_family_id$nl80211(&(0x7f0000000580)='nl80211\x00') 17:51:02 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/15, 0xf) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 367.796505][T15888] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 367.925761][T15901] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 17:51:02 executing program 4: pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xe, 0xffffffffffffffff) 17:51:02 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5", 0x3}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:05 executing program 0: r0 = socket(0x25, 0x1, 0x0) accept$nfc_llcp(r0, 0x0, 0x0) 17:51:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:05 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5", 0x3}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:05 executing program 4: bpf$BPF_BTF_LOAD(0x6, 0x0, 0x0) 17:51:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a1"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:05 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/15, 0xf) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:05 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000040)) 17:51:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002000, 0x0) 17:51:05 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5", 0x3}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:05 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/15, 0xf) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 370.859260][T15927] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:51:05 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0xd, &(0x7f00000005c0)={0x0}, 0x10) 17:51:05 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:05 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x7, 0x0, 0x0) 17:51:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:08 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be", 0x4}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:08 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8906, 0x0) 17:51:08 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8901, 0x0) 17:51:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a1"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:08 executing program 0: pselect6(0x40, &(0x7f00000002c0), &(0x7f0000000380), 0x0, &(0x7f0000000440), 0x0) [ 373.888342][T15961] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:51:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x89a0, &(0x7f0000000580)={'vxcan1\x00'}) 17:51:08 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be", 0x4}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:08 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:08 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be", 0x4}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000680)={0x7, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000ac0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 17:51:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000040a01010000000000007a32000000000b"], 0x38}}, 0x0) 17:51:11 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r0, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4000000000000a12, 0x0) 17:51:11 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x4, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000000100)=""/228, 0x32, 0xe4, 0x1}, 0x20) 17:51:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a1"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) [ 376.953294][T15999] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 376.958396][T16002] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 17:51:11 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x4, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private1}}) 17:51:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:11 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r0, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4000000000000a12, 0x0) 17:51:11 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x40, 0x0) 17:51:11 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x4, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:11 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="7c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000004c0012800b00010067726574617000003c0002800800040009000000050009000400000005001300000000000800070000000000050009003f00000008000700ac1e010105000a000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00'], 0x7c}}, 0x0) 17:51:11 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r0, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4000000000000a12, 0x0) 17:51:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@restrict, @volatile, @struct={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000100)=""/228, 0x41, 0xe4, 0x1}, 0x20) 17:51:11 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:12 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000d00)={0x9}, 0x0, 0x0, 0x0, 0x0) 17:51:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:12 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4000000000000a12, 0x0) 17:51:12 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="7c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000004c0012800b00010067726574617000003c0002800800040009000000050009000400000005001300000000000800070000000000050009003f00000008000700ac1e010105000a000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00'], 0x7c}}, 0x0) [ 377.682212][T16048] netlink: 'syz-executor.2': attribute type 13 has an invalid length. 17:51:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict]}}, 0x0, 0x8a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:14 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:14 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x8, 0x4) 17:51:14 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="7c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000004c0012800b00010067726574617000003c0002800800040009000000050009000400000005001300000000000800070000000000050009003f00000008000700ac1e010105000a000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00'], 0x7c}}, 0x0) 17:51:14 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4000000000000a12, 0x0) 17:51:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:14 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4000000000000a12, 0x0) 17:51:14 executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(r0, &(0x7f0000000000)='reno\x00', 0x5) 17:51:14 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 380.176406][T16061] netlink: 'syz-executor.2': attribute type 13 has an invalid length. 17:51:14 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="7c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000004c0012800b00010067726574617000003c0002800800040009000000050009000400000005001300000000000800070000000000050009003f00000008000700ac1e010105000a000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00'], 0x7c}}, 0x0) 17:51:15 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="cf989e5877f6deb398ae4b70247384d38a92861ff442ba15cf1535f3fdc5912783fe7faa92024d4c1d7fb5ecf06d17dcf60453cf8b05f501c7afab0c3af301592fa1517602cc7e1a5a860f0e104a3928d2b94450ecc318718f3e7e587c9c4dc94a33fba73bda216f5baf14d0ace25d70743e05a9fa5ec483b4b950283ed31ac693feec2826c0fce92ac9f47a9bde46f7db19eea3474d80a0303cc25f90610e196feaddeec39d2c25139dab3bc7bf0cc740ec18aa94055c6a9ec43e28f128811fc16688dc6efb20ecc1011afd1b0afb9a77e951338285024abf03f17ac2f5cffd88e5da61251dac1db7c8615bec6e0814b47c834ad9da2cf5e309ea279c04ef64", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 17:51:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000180)) 17:51:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict]}}, 0x0, 0x8a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:17 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:17 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 17:51:17 executing program 4: syz_open_procfs(0x0, &(0x7f0000002ac0)='maps\x00') 17:51:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:17 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="de09fd61e9c6066915bc9ae5af986e8f", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) write(r1, &(0x7f00000009c0)="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", 0x100) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 17:51:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000100)={0x417, 0x6, 0x6}) 17:51:18 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 383.253252][T16097] netlink: 'syz-executor.2': attribute type 13 has an invalid length. 17:51:18 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/exec\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='attr\x00') getdents64(r0, &(0x7f0000000680)=""/190, 0xbe) 17:51:18 executing program 4: faccessat(0xffffffffffffffff, 0x0, 0x37) 17:51:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0x0, 0x0, 0x0, 0x4, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0xe) r0 = perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x14000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000280)={0x2, r2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@random="c902", 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00'}) 17:51:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict]}}, 0x0, 0x8a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:20 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 17:51:20 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:20 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000440)={0x0, "b41d67d8aea6ebb0566b89fda4f6d39731b411c8f6bd07ef2d0e61327ea0a58af5f4a29c5b3cbc4f04f7d02b45adaad1c97fa05ce0b1a580a51e9c431f11768f"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, r0, 0xffffffffffffffff) 17:51:20 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) syz_open_dev$ptys(0xc, 0x3, 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f00000001c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x8, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) socketpair(0x26, 0x0, 0x6, 0x0) syz_genetlink_get_family_id$devlink(0x0) 17:51:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:21 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c79693240", 0x36}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x105042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x8200) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) bind$inet(0xffffffffffffffff, 0x0, 0x0) 17:51:21 executing program 4: request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0xfffffffffffffffc) 17:51:21 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x804) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f00000001c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x8, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x4b66, &(0x7f0000000000)) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 386.479537][ T35] audit: type=1800 audit(1611165081.174:8): pid=16143 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16340 res=0 errno=0 17:51:21 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c79693240", 0x36}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 386.539410][ T35] audit: type=1800 audit(1611165081.234:9): pid=16149 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16340 res=0 errno=0 17:51:21 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) syz_open_dev$ptys(0xc, 0x3, 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f00000001c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x8, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) socketpair(0x26, 0x0, 0x6, 0x0) syz_genetlink_get_family_id$devlink(0x0) 17:51:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:24 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') 17:51:24 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c79693240", 0x36}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:24 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x804) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f00000001c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x8, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x4b66, &(0x7f0000000000)) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 17:51:24 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) syz_open_dev$ptys(0xc, 0x3, 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f00000001c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x8, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) socketpair(0x26, 0x0, 0x6, 0x0) syz_genetlink_get_family_id$devlink(0x0) 17:51:24 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac5", 0x51}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:24 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000440)={0x0, "b41d67d8aea6ebb0566b89fda4f6d39731b411c8f6bd07ef2d0e61327ea0a58af5f4a29c5b3cbc4f04f7d02b45adaad1c97fa05ce0b1a580a51e9c431f11768f"}, 0x48, 0xfffffffffffffffd) keyctl$update(0x2, r0, &(0x7f0000000300)="b4", 0x1) 17:51:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@random="c902", 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) 17:51:24 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac5", 0x51}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:24 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) syz_open_dev$ptys(0xc, 0x3, 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f00000001c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x8, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) socketpair(0x26, 0x0, 0x6, 0x0) syz_genetlink_get_family_id$devlink(0x0) 17:51:24 executing program 0: keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 17:51:27 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x804) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f00000001c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x8, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x4b66, &(0x7f0000000000)) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 17:51:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:27 executing program 0: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000140)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "f6492531"}, 0x0, 0x0, @userptr}) 17:51:27 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac5", 0x51}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5e0, 0x260, 0x330, 0x0, 0x330, 0x260, 0x5b0, 0x5b0, 0x5b0, 0x5b0, 0x5b0, 0x6, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@private2, @private0, [], [], 'vlan1\x00', 'ip6gretap0\x00'}, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @private1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@private0, @empty, [], [], 'macvtap0\x00', 'geneve0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@private, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, [], [], 'veth0_vlan\x00', 'nr0\x00'}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@ipv4={[], [], @multicast1}, @ipv4=@multicast2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x640) 17:51:27 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b10", 0x5e}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:27 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c63daaaa"}, 0x0, 0x0, @userptr}) 17:51:27 executing program 0: openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000001140)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 17:51:27 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x6, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x4, 0x30, 0x6, 0x0, 0x4, 0x5, 'syz0\x00', &(0x7f0000000040)=['\x00', '\x00', 'd[:\x00', '][:)]]\\\xee:%\x00'], 0x11, [], [0x1f, 0x1, 0xef09]}) 17:51:27 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b10", 0x5e}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:27 executing program 0: wait4(0x0, 0x0, 0x0, &(0x7f0000000040)) [ 392.724648][T16239] snd_dummy snd_dummy.0: control 0:0:0:syz1:0 is already present 17:51:27 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x804) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f00000001c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x8, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x4b66, &(0x7f0000000000)) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 17:51:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000040), &(0x7f0000000080)=0x8) 17:51:30 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b10", 0x5e}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:30 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) read$char_usb(r0, &(0x7f0000000080)=""/218, 0xda) read$FUSE(r0, &(0x7f0000000e00)={0x2020}, 0x2020) 17:51:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:30 executing program 4: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x0, 0x0) getresuid(&(0x7f0000001b80), &(0x7f0000001bc0), &(0x7f0000001c00)) 17:51:30 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x0, 0x0, 0x0, 0x3}, 0x1c) 17:51:30 executing program 4: syz_open_dev$vcsa(&(0x7f00000029c0)='/dev/vcsa#\x00', 0x0, 0x260102) 17:51:30 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c", 0x65}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:30 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) read$char_usb(r0, &(0x7f0000000080)=""/218, 0xda) read$FUSE(r0, &(0x7f0000000e00)={0x2020}, 0x2020) 17:51:30 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 17:51:30 executing program 4: bpf$MAP_CREATE(0x8, &(0x7f00000001c0), 0x40) 17:51:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:33 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c", 0x65}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MPATH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x6000}, 0x0) 17:51:33 executing program 4: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:51:33 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000b80)={'batadv_slave_0\x00'}) 17:51:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:33 executing program 4: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 17:51:33 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c", 0x65}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, 0x0, 0xfffffffffffffffe) 17:51:33 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @empty}], 0x1c) 17:51:33 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_tables_matches\x00') read$FUSE(r0, &(0x7f0000000e00)={0x2020}, 0x2020) 17:51:33 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f23", 0x68}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:36 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_RECMASK(r0, 0x80044dfd, &(0x7f00000000c0)) 17:51:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:51:36 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f000000f4c0)='ns/pid\x00') 17:51:36 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f23", 0x68}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:36 executing program 0: bpf$MAP_CREATE(0x21, 0x0, 0x0) 17:51:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x1c, r1, 0x121, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 17:51:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:51:36 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f23", 0x68}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) [ 401.854287][T16361] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 17:51:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) [ 401.914624][T16367] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 17:51:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:39 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bc", 0x6a}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) signalfd(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x4c}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 17:51:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:51:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="50000000100007477427", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, 0x0, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:51:39 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bc", 0x6a}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 404.766601][T16384] team0: Device vlan2 is already an upper device of the team interface [ 404.805106][T16387] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 17:51:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) [ 404.847786][T16384] team0: Device vlan2 is already an upper device of the team interface 17:51:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, 0x0, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:51:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000400)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @remote}, @in6={0xa, 0x0, 0x0, @private0}], 0xff76) 17:51:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:42 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bc", 0x6a}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:42 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, 0x0, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:51:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_SET_MPATH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x20}}, 0x0) 17:51:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="50000000100007477427", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:42 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r0, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:51:42 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x24, 0x0, 0x0) 17:51:42 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:42 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 407.823736][T16432] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 17:51:42 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r0, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:51:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003cc0)={&(0x7f0000003040)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x40050) 17:51:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:45 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:45 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:45 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r0, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:51:45 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x450001, 0x0) 17:51:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="50000000100007477427", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x7d, &(0x7f0000001140)=[@in], 0x10) 17:51:45 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, 0x0, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) [ 410.911714][T16468] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 17:51:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, 0x0, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:51:48 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, 0x0, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:48 executing program 4: openat2$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x103040}, 0x18) 17:51:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:51:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:48 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r0, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:51:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) [ 413.956283][T16498] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 17:51:48 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:48 executing program 4: r0 = io_uring_setup(0x3, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000080), 0x1) 17:51:48 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:48 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r0, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:51:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:51 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000002500)='ns/cgroup\x00') 17:51:51 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r0, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:51:51 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:51 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 416.991397][T16539] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 17:51:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) 17:51:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, 0x0, 0x0) 17:51:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:51 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x72, 0x0, &(0x7f0000000080)) 17:51:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, 0x0, 0x0) 17:51:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:54 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:54 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x4000, 0x0) 17:51:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, 0x0, 0x0) [ 420.040070][T16571] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 17:51:54 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x801, 0x0) 17:51:54 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0x0) 17:51:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:51:57 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:57 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg(r0, &(0x7f0000004140)=[{{&(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000240)="00bf", 0x2}], 0x1, &(0x7f0000000500)=[{0x10}], 0x10}}], 0x1, 0x0) 17:51:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0x0) 17:51:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:51:57 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440), 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:51:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:51:57 executing program 4: bpf$MAP_CREATE(0x1e, 0x0, 0x0) [ 423.128146][T16608] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 17:51:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0x0) 17:51:58 executing program 4: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) 17:51:58 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440), 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:52:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:00 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:52:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={0x0}}, 0x0) 17:52:00 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440), 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:52:00 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x40c0, 0x0) 17:52:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:52:00 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:52:00 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) [ 426.174681][T16639] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 17:52:00 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:52:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={0x0}}, 0x0) 17:52:01 executing program 4: bpf$MAP_CREATE(0xf, &(0x7f00000001c0), 0x40) 17:52:01 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:52:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={0x0}}, 0x0) 17:52:03 executing program 4: pipe2(&(0x7f0000000600)={0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) 17:52:03 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:52:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:52:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:52:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:52:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x1b, 0x0, &(0x7f0000000100)) 17:52:04 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:52:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, 0x0, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) [ 429.280084][T16673] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 17:52:04 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/crypto\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x60001) r0 = socket$unix(0x1, 0x5, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000140), 0x5, 0x0, 0x0, &(0x7f0000000040), 0xbffffffe) syz_open_procfs(0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000080)="322a8866935074e9877ed92106cc6f27d94dfbdd13fd6adfe1fe6c704d00f5927ecc4d2241e24dde60c316c72d5a16cc432b48f18c69c6451ecb96957e7feb7ebe2bb1cc552567963561df20c48b417b05356d02d674376d14ddd2a538db0c67fc7380e16ee6cc2611db4d13a4", &(0x7f0000000180), &(0x7f00000001c0), 0x0) r2 = gettid() tkill(r2, 0x39) creat(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:52:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, 0x0, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) [ 429.556938][T16693] futex_wake_op: syz-executor.4 tries to shift op by -1; fix this program 17:52:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:06 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/12, 0xc) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:52:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:52:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 17:52:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, 0x0, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:52:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a3", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:52:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:52:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:52:07 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/12, 0xc) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:52:07 executing program 4: r0 = socket(0x10, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f5, 0x4}, 0x10}}, 0x0) [ 432.359978][T16712] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 17:52:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:52:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in=@empty, @in=@broadcast}, {@in=@multicast1, 0x0, 0x32}, @in=@private, {}, {}, {}, 0x70bd28}}}, 0xf8}}, 0x0) 17:52:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:52:10 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/12, 0xc) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:52:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r1, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:52:10 executing program 4: r0 = syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000090000082505a8a407000000010109022400010100000009040000120701010009050102ba"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) syz_usb_disconnect(0xffffffffffffffff) write$char_usb(r1, &(0x7f0000000700)="a9", 0x1) 17:52:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a3", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:52:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x64, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x14, 0x11d, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}]}]}, 0x64}}, 0x0) 17:52:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, 0x0, 0x0) 17:52:10 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/14, 0xe) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 435.423042][T16742] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 17:52:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, 0x0, 0x0) 17:52:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x50, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}]}, 0x50}}, 0x0) 17:52:10 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/14, 0xe) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) [ 435.830465][ T8987] usb usb5-port1: Cannot enable. Maybe the USB cable is bad? [ 436.139717][ T8987] usb usb5-port1: Cannot enable. Maybe the USB cable is bad? [ 436.147244][ T8987] usb usb5-port1: attempt power cycle [ 436.790175][ T8987] usb usb5-port1: Cannot enable. Maybe the USB cable is bad? [ 437.089695][ T8987] usb usb5-port1: Cannot enable. Maybe the USB cable is bad? [ 437.097213][ T8987] usb usb5-port1: unable to enumerate USB device 17:52:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, 0x0, 0x0) 17:52:13 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/14, 0xe) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:52:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x50, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}]}, 0x50}}, 0x0) 17:52:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a3", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:52:13 executing program 4: r0 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 17:52:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x50, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}]}, 0x50}}, 0x0) 17:52:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 17:52:13 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x14) [ 438.486642][T16783] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 17:52:13 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/15, 0xf) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:52:13 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000001c0)=@req={0x28, &(0x7f0000000180)={'veth1_to_team\x00', @ifru_addrs=@xdp={0x2c, 0x0, 0x0}}}) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000200)={@mcast1, r1}, 0x14) 17:52:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 17:52:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x58, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x58}}, 0x0) 17:52:16 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/15, 0xf) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:52:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 17:52:16 executing program 4: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self\x00', 0x440c0, 0x0) 17:52:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:52:16 executing program 4: r0 = socket(0x10, 0x80002, 0x0) recvmsg(r0, &(0x7f0000000180)={&(0x7f0000000080)=@ax25={{0x3, @rose}, [@null, @default, @remote, @remote, @netrom, @remote, @bcast, @default]}, 0x80, &(0x7f0000000140), 0x0, 0x0, 0xfffffea8}, 0x0) 17:52:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 17:52:16 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/15, 0xf) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:52:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x58, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x58}}, 0x0) [ 441.533577][T16814] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:52:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x58, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x58}}, 0x0) 17:52:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 17:52:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 17:52:19 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:52:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x5c, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x4}, {0x4}]}]}, 0x5c}}, 0x0) 17:52:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xba}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:19 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff0a, &(0x7f0000000380)=[{&(0x7f0000000140)=""/64, 0x40}], 0x1}, 0x0) write$binfmt_script(r1, 0x0, 0x0) 17:52:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:52:19 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:52:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x5c, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x4}, {0x4}]}]}, 0x5c}}, 0x0) 17:52:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, 0x0, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:52:19 executing program 4: r0 = socket(0x10, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x0, 0x10000}, 0x80) [ 444.647146][T16854] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:52:19 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4000000000000a12, 0x0) 17:52:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, 0x0, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:52:19 executing program 4: socketpair(0x26, 0x5, 0x2, &(0x7f0000000040)) 17:52:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x5c, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x4}, {0x4}]}]}, 0x5c}}, 0x0) 17:52:19 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4000000000000a12, 0x0) 17:52:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xba}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, 0x0, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:52:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x60, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0x4}, {0x8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x4}]}]}]}, 0x60}}, 0x0) 17:52:22 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x0], 0x1}, 0x20) 17:52:22 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4000000000000a12, 0x0) 17:52:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:52:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x5c, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x4}]}]}]}, 0x5c}}, 0x0) 17:52:22 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4000000000000a12, 0x0) 17:52:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) [ 447.696745][T16897] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:52:22 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000100)='net_prio.ifpriomap\x00', 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r1, 0x3}, 0x10) 17:52:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x5c, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x4}]}]}]}, 0x5c}}, 0x0) 17:52:22 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4000000000000a12, 0x0) 17:52:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xba}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:52:25 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000040)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) 17:52:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x5c, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xdd}]}]}, @NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x4}]}]}]}, 0x5c}}, 0x0) 17:52:25 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4000000000000a12, 0x0) 17:52:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:52:25 executing program 4: gettid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40719, 0x7fff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() r4 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x1f, 0xa6, 0x2, 0x7, 0x0, 0x1fe, 0x2008c, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000300), 0x4}, 0x40000, 0xee3, 0x27, 0x7, 0x10001, 0x4cfe, 0x400}, r3, 0x8, 0xffffffffffffffff, 0x8) syz_open_procfs$namespace(r3, &(0x7f0000000140)='ns/time_for_children\x00') ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000100)) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='}/]{)\\&){,*,:\xb1!\x00') write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x6400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1000000000039) close(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000240)="89000000120081ae08060c0f006b3f007f03e3f70000000136e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e22ef6a80277bec00123d000200390077a0bdad446b9bbc7a46e3988285dcdf12f213d3f868fecea4e45516d571ad14955f947ee2b49e566f8afa8af92347510f0b56a20ff27f", 0x89}], 0x1}, 0x0) close(r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[], &(0x7f0000001d00)=""/4096, 0x66, 0x1000, 0x1}, 0x20) 17:52:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x50, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0x4}, {0x8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x4}]}]}]}, 0x50}}, 0x0) [ 450.743679][T16933] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:52:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:52:25 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4000000000000a12, 0x0) 17:52:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x48, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x48}}, 0x0) 17:52:25 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 17:52:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x48, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x48}}, 0x0) 17:52:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:52:28 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 17:52:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xba}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:52:28 executing program 4: gettid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40719, 0x7fff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() r4 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x1f, 0xa6, 0x2, 0x7, 0x0, 0x1fe, 0x2008c, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000300), 0x4}, 0x40000, 0xee3, 0x27, 0x7, 0x10001, 0x4cfe, 0x400}, r3, 0x8, 0xffffffffffffffff, 0x8) syz_open_procfs$namespace(r3, &(0x7f0000000140)='ns/time_for_children\x00') ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000100)) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='}/]{)\\&){,*,:\xb1!\x00') write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x6400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1000000000039) close(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000240)="89000000120081ae08060c0f006b3f007f03e3f70000000136e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e22ef6a80277bec00123d000200390077a0bdad446b9bbc7a46e3988285dcdf12f213d3f868fecea4e45516d571ad14955f947ee2b49e566f8afa8af92347510f0b56a20ff27f", 0x89}], 0x1}, 0x0) close(r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[], &(0x7f0000001d00)=""/4096, 0x66, 0x1000, 0x1}, 0x20) 17:52:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) [ 453.795861][T16971] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:52:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x48, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x48}}, 0x0) 17:52:28 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="8f2a640a02abd2138310cd5e69c261c3d3f2d906f99bd3cdad2494d04de89443a018546ac6cb7b6345600e85398c250a332c7969324054702fff995a729f40c30695255c876b50f4995ce72688c6b8aac536ab532b37a7c72ce106c64b1097034ffc05551c5a7f2367bcc8", 0x6b}, {&(0x7f0000000080)="cc75e5be0b", 0x5}, {&(0x7f00000000c0)="2147e501c2c3cb4c61b05006cc64a3d47b80ce956bd3bad60ffd3b300c41c7c1a4af9ee8398b63a70ae2151a93f5788ec37993c85b4bf84d36b46aef7cbc5494f2e3d03fd18542080624b2c173e9f7288ae303454a903be5318eb9e031a210f34cae84", 0x63}, {&(0x7f0000000140)="d8", 0x1}, {&(0x7f0000000700)="66a1ccd624efe008fc684c74538aa4ae144e32bea61376e03785f66f52886ca2c42a5a3939d96dab9406f81d7d0561acb64019a22f10eb43acf474b5", 0x3c}], 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 17:52:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x3c, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x3c}}, 0x0) 17:52:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x4c, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x4}, {0x4}]}]}, 0x4c}}, 0x0) 17:52:28 executing program 5: gettid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40719, 0x7fff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() r4 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x1f, 0xa6, 0x2, 0x7, 0x0, 0x1fe, 0x2008c, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000300), 0x4}, 0x40000, 0xee3, 0x27, 0x7, 0x10001, 0x4cfe, 0x400}, r3, 0x8, 0xffffffffffffffff, 0x8) syz_open_procfs$namespace(r3, &(0x7f0000000140)='ns/time_for_children\x00') ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000100)) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='}/]{)\\&){,*,:\xb1!\x00') write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x6400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1000000000039) close(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000240)="89000000120081ae08060c0f006b3f007f03e3f70000000136e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e22ef6a80277bec00123d000200390077a0bdad446b9bbc7a46e3988285dcdf12f213d3f868fecea4e45516d571ad14955f947ee2b49e566f8afa8af92347510f0b56a20ff27f", 0x89}], 0x1}, 0x0) close(r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[], &(0x7f0000001d00)=""/4096, 0x66, 0x1000, 0x1}, 0x20) 17:52:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x30, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}]}, 0x30}}, 0x0) 17:52:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x4c, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x4}, {0x4}]}]}, 0x4c}}, 0x0) 17:52:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x30, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}]}, 0x30}}, 0x0) 17:52:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xba}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x4c, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x4}, {0x4}]}]}, 0x4c}}, 0x0) 17:52:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:52:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x30, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "b491cb812f8209cb655b20e53465c71e"}]}, 0x30}}, 0x0) 17:52:31 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x4}}, 0x10, 0x0}, 0x0) 17:52:31 executing program 5: r0 = socket(0x2, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f00000000c0)) 17:52:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x28, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x28}}, 0x0) 17:52:31 executing program 4: r0 = getpgrp(0x0) migrate_pages(r0, 0x3, 0x0, 0x0) [ 456.879892][T17017] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:52:31 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r1) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="e2", 0x1, r2) 17:52:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x4c, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x4}]}]}]}, 0x4c}}, 0x0) 17:52:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xba}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:31 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x2, &(0x7f0000000280)=[{}, {0x2}]}) 17:52:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x4c, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x4}]}]}]}, 0x4c}}, 0x0) 17:52:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002740)={&(0x7f0000000040)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 17:52:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:52:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x28, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x28}}, 0x0) 17:52:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x4c, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc6}]}]}, @NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x4}]}]}]}, 0x4c}}, 0x0) 17:52:32 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x143042, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r1, 0x20, 0x0, 0x1000) 17:52:32 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$sock_int(r0, 0xffff, 0x8, 0x0, 0x0) 17:52:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x28, r2, 0x121, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x28}}, 0x0) 17:52:32 executing program 4: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000100), &(0x7f0000000240)=0x8) 17:52:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x38, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0x4}, {0x8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x4}]}]}]}, 0x38}}, 0x0) 17:52:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xa2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0x3, 0x0, 0x0) 17:52:34 executing program 5: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3) 17:52:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x30, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x30}}, 0x0) 17:52:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000001540)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, &(0x7f0000001240)=[{&(0x7f00000000c0)="5069277a1039aba2835ce5eba50a5e3c30d8953a8286798cf1c00b95b1fcb4f2a56818ee164b01d0a4ff6aad192e714fa1f4da6917d6060bca320e924654ba761ebb6b47c0e581591d2f4dc33548aacf9128bdb541c4209a1f5ed0f2d75f47cc04a96aced386520577c134457b132bd7398caa65ae6c713daa6651e0942595fe2d5c6d274293fd48fc43d866749bafc3885e4876522392b52afb9e3fc91e8424d4ee62264397829654bd8ca9c469bce3fb25377634c62d643fb4f71e8dae44885ef3802b5a68a38ae8c1661f4712e21945792ceca42c462df2ea860eb0e7711d", 0xe0}, {&(0x7f00000001c0)="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", 0xed5}], 0x2}, 0x0) 17:52:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:52:34 executing program 0: getresgid(0x0, &(0x7f0000000180), 0x0) 17:52:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x9, &(0x7f0000000000)={@rand_addr=0x4, @loopback}, 0x8) 17:52:34 executing program 4: mlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 17:52:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x30, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x30}}, 0x0) 17:52:35 executing program 0: r0 = socket(0x2, 0x3, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x51, 0x0, 0x0) 17:52:35 executing program 5: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8) 17:52:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xa2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f0000000100)={0x0, 0x7fff}, 0x8) 17:52:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x30, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x30}}, 0x0) 17:52:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000000), &(0x7f00000000c0)=0x94) 17:52:37 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$sock_int(r0, 0xffff, 0x40, &(0x7f00000000c0)=0x4, 0x4) 17:52:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000), 0x4924924924924cb, 0x0) 17:52:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, @in, 0x80}, 0xa0) 17:52:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180), 0x8c) 17:52:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x34, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x4}, {0x4}]}]}, 0x34}}, 0x0) 17:52:38 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000001d40)) 17:52:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x34, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x4}, {0x4}]}]}, 0x34}}, 0x0) 17:52:38 executing program 4: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000740)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 17:52:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xa2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:40 executing program 5: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x30000000}, &(0x7f0000000080)={0x5}, &(0x7f00000000c0)={0x7}) 17:52:40 executing program 0: madvise(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3) 17:52:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x34, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x4}, {0x4}]}]}, 0x34}}, 0x0) 17:52:40 executing program 4: r0 = socket$inet6(0x1c, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 17:52:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, 0x0, 0x0, 0x0) 17:52:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$ptmx(0xffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2}, 0x10) 17:52:41 executing program 5: open(0x0, 0x40000, 0x0) 17:52:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x34, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x4}]}]}]}, 0x34}}, 0x0) 17:52:41 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000140)="f0f72498829d5201ce6eab31746668a2e63110d20aaeba", 0x17, 0x20000, &(0x7f00000006c0)={0x1c, 0x1c, 0x2}, 0x1c) 17:52:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xba}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:41 executing program 4: madvise(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x1) 17:52:41 executing program 5: sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=@un=@abs={0x8}, 0xffffffffffffff79) 17:52:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x34, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x4}]}]}]}, 0x34}}, 0x0) 17:52:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, &(0x7f0000000300)='}', 0x1, 0x0, &(0x7f00000003c0)=@in={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:52:41 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000300)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) 17:52:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000300)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000080)=[{&(0x7f0000000040)='\"', 0x1}], 0x1, &(0x7f0000000200)=[@prinfo={0x14, 0x84, 0x7, {0x3}}, @dstaddrv4={0x10, 0x84, 0x9, @loopback}, @sndrcv={0x2c}, @init={0x14, 0x84, 0x1, {0x3, 0x1, 0xffff}}, @init={0x14, 0x84, 0x1, {0x0, 0x0, 0x101, 0x1}}, @sndinfo={0x1c}], 0x94}, 0x20098) 17:52:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, 0x0, 0x0, 0x0) 17:52:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000400)={0x34, r1, 0x70e5a787e09b7c31, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x4}]}]}]}, 0x34}}, 0x0) 17:52:41 executing program 5: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) openat$ptmx(0xffffff9c, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:52:41 executing program 0: r0 = socket(0x1c, 0x10000001, 0x84) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000400)={0x0, 0x62a, 0x1, "9e"}, 0x9) 17:52:41 executing program 4: open(0x0, 0x102, 0x0) 17:52:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xba}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:44 executing program 0: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x5}, &(0x7f00000000c0)={0x0, 0x1}) 17:52:44 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_int(r0, 0x0, 0x18, 0x0, &(0x7f0000000240)) 17:52:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$sock_int(r0, 0xffff, 0x1, 0x0, 0x0) 17:52:44 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000001140)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, 0x0, 0xc}, 0x0) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 17:52:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/nf_conntrack\x00') syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600fd5721d41001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000f0001006d616373656300e10b00020005000d00000300000a0005c0100008000000008008000a0009d35b58003e00b0b9cad4a128"], 0x50}, 0x1, 0x0, 0x0, 0x20044020}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r2, 0x0, 0x0, 0x0) 17:52:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000400)=ANY=[], 0xa) 17:52:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x82, 0x0, 0x0) 17:52:44 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000001140)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, 0x0, 0xc}, 0x0) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 17:52:44 executing program 0: setgroups(0x4, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0]) 17:52:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f00000015c0)={&(0x7f0000000100)=@un=@file={0xa}, 0xa, &(0x7f0000001440)=[{&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001140)="73084fb2bc51f87841ad68d49ec90e791974d4712d4c9b2ce8f2594cf9b5b044b2846609c806f43273d2fd458abfec3dd3a7e1", 0x33}, {&(0x7f0000001180)="3e29320a424884609d9873cd016ea3dc34bd6af2c9f8d9bd4659c5cef3acce11727535a3875d0bed2511683abd2a648972707660a1ea65a2926316a75459c0ae170af1cad7fe20f524bc41f041", 0x4d}, {&(0x7f0000001200)="9f19f0b178f885f5e3ce7cb78a31ffdaa03485bf389ee2f688286a861a182cffbd459a05c995f7de4c", 0x29}], 0x4}, 0x81) 17:52:44 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 17:52:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000001140)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, 0x0, 0xc}, 0x0) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 17:52:47 executing program 5: getpeername$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) 17:52:47 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000300)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000080)=[{&(0x7f0000000040)='\"', 0x1}], 0x1, &(0x7f0000000200)=[@prinfo={0x14, 0x84, 0x7, {0x3}}, @dstaddrv4={0x10, 0x84, 0x9, @loopback}, @sndrcv={0x2c}, @init={0x14, 0x84, 0x1, {0x3, 0x1, 0xffff}}, @init={0x14, 0x84, 0x1, {0x0, 0x0, 0x101, 0x1}}, @dstaddrv6={0x1c, 0x84, 0xa, @loopback}, @sndinfo={0x1c}], 0xb0}, 0x20098) 17:52:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xba}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:47 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) connect(r0, &(0x7f0000000000)=@un=@abs={0x8, 0x1}, 0x8) 17:52:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$sock_int(r0, 0xffff, 0x1018, 0x0, 0x0) 17:52:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 17:52:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000001140)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, 0x0, 0xc}, 0x0) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 17:52:47 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000001140)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x10) 17:52:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000300)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000080)=[{&(0x7f0000000040)='\"', 0x1}], 0x1, &(0x7f0000000200)=[@sndinfo={0x1c}], 0x1c}, 0x0) 17:52:47 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0xbe4b}, 0x10) 17:52:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_int(r1, 0x0, 0x46, 0x0, 0x0) 17:52:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x47, &(0x7f0000000000)={@rand_addr, @multicast2, @loopback}, 0xc) 17:52:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xba}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:50 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_mreqn(r0, 0x0, 0x18, &(0x7f0000000080)={@loopback, @local={0xac, 0x14, 0x0}}, 0xc) 17:52:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0xd, &(0x7f0000000000)={@local={0xac, 0x14, 0x0}, @local={0xac, 0x14, 0x0}}, 0x8) 17:52:50 executing program 5: openat$ptmx(0xffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2cd35be0c9306b39, 0x0) 17:52:50 executing program 3: chown(&(0x7f00000006c0)='./file0\x00', 0xffffffffffffffff, 0x0) 17:52:50 executing program 2: io_setup(0x5, &(0x7f0000000180)=0x0) io_setup(0x800, &(0x7f0000000000)=0x0) io_destroy(r1) io_destroy(r0) 17:52:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f0000000b00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 17:52:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x8, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x95}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:52:50 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:50 executing program 5: bpf$MAP_UPDATE_BATCH(0xc, 0x0, 0x0) 17:52:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xd}]}]}}, &(0x7f00000000c0)=""/234, 0x32, 0xea, 0x1}, 0x20) 17:52:50 executing program 2: r0 = openat$vicodec1(0xffffff9c, &(0x7f0000002680)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_TUNER(r0, 0x5421, &(0x7f0000000240)={0x2, "f63844a838ab9588bf7d84753ec9aad371ca329643bccd78d750b4b88f402917"}) 17:52:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xba}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:53 executing program 4: keyctl$dh_compute(0x17, &(0x7f00000003c0), &(0x7f00000006c0)=""/4096, 0x1000, &(0x7f0000000480)={0x0}) 17:52:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000000)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newqdisc={0x34, 0x24, 0x67e0317e552b57d7, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0x4}}]}, 0x34}}, 0x0) 17:52:53 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) r0 = socket$key(0xf, 0x3, 0x2) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) close(0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x3e8, 0x0, 0xc700, 0x294, 0x154, 0x294, 0x320, 0x378, 0x2000, 0x320, 0x378, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a], 0x0, 0xec, 0x154, 0x52020000, {}, [@common=@inet=@ecn={{0x24, 'ecn\x00'}, {0x21}}, @common=@inet=@dscp={{0x24, 'dscp\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@ipv6={@private2, @private1, [], [], 'vlan1\x00', 'sit0\x00'}, 0x0, 0xa4, 0x1cc}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:fixed_disk_device_t:s0\x00'}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x444) 17:52:53 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fb1\x00', 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f00000001c0)={0x0, 0x1, &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140), 0x0}) 17:52:53 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') read$FUSE(r1, &(0x7f0000000300)={0x2020}, 0x2020) msgctl$IPC_INFO(0x0, 0x3, 0x0) openat$fb1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUTCMAP(0xffffffffffffffff, 0x4605, 0x0) 17:52:53 executing program 5: socket(0x29, 0x2, 0xfa3) 17:52:53 executing program 2: r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) shmat(r0, &(0x7f0000cf2000/0x1000)=nil, 0x4000) 17:52:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000540)="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", 0x558, r0) keyctl$read(0x3, r1, &(0x7f0000001540)=""/4096, 0x1000) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x80000, 0x0) 17:52:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000000)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newqdisc={0x34, 0x24, 0x67e0317e552b57d7, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0x4}}]}, 0x34}}, 0x0) 17:52:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)=@newsa={0xec, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in=@broadcast, 0x0, 0x33}, @in=@private, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xec}}, 0x0) 17:52:53 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') read$FUSE(r1, &(0x7f0000000300)={0x2020}, 0x2020) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fb1\x00', 0x0, 0x0) 17:52:56 executing program 0: syz_emit_ethernet(0x15, &(0x7f0000000000)={@random="f6eec56159e8", @multicast, @val={@void, {0x8864}}, {@llc_tr={0x11, {@llc={0x0, 0x0, 'J'}}}}}, 0x0) 17:52:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xba}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:56 executing program 4: epoll_create1(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fdinfo/3\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/71, 0x47}], 0x1, 0x0, 0x0) 17:52:56 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') read$FUSE(r1, &(0x7f0000000300)={0x2020}, 0x2020) msgctl$IPC_INFO(0x0, 0x3, 0x0) openat$fb1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUTCMAP(0xffffffffffffffff, 0x4605, 0x0) 17:52:56 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fb1\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) r0 = socket$key(0xf, 0x3, 0x2) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000280), 0x4) pwritev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) close(0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x3e8, 0x0, 0xc700, 0x294, 0x154, 0x294, 0x320, 0x378, 0x2000, 0x320, 0x378, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a], 0x0, 0xec, 0x154, 0x52020000, {}, [@common=@inet=@ecn={{0x24, 'ecn\x00'}, {0x21}}, @common=@inet=@dscp={{0x24, 'dscp\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@ipv6={@private2, @private1, [], [], 'vlan1\x00', 'sit0\x00'}, 0x0, 0xa4, 0x1cc}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:fixed_disk_device_t:s0\x00'}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x444) 17:52:56 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') read$FUSE(r1, &(0x7f0000000300)={0x2020}, 0x2020) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fb1\x00', 0x0, 0x0) 17:52:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000b40)=@security={'security\x00', 0xe, 0x4, 0x54c, 0xffffffff, 0x220, 0x220, 0x0, 0xffffffff, 0xffffffff, 0x4b8, 0x4b8, 0x4b8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf8, 0x220, 0x0, {}, [@common=@unspec=@physdev={{0x64, 'physdev\x00'}, {'macvlan0\x00', {}, 'macvlan1\x00', {}, 0x0, 0x2}}, @common=@ttl={{0x24, 'ttl\x00'}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:inetd_child_exec_t:s0\x00'}}}, {{@ip={@multicast1, @remote, 0x0, 0x0, 'veth0_vlan\x00', 'ip6gre0\x00'}, 0x0, 0xb8, 0x118, 0x0, {}, [@common=@unspec=@ipvs={{0x48, 'ipvs\x00'}, {@ipv6=@local}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@uncond, 0x0, 0x124, 0x180, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz0\x00'}}, @common=@unspec=@physdev={{0x64, 'physdev\x00'}, {'ip_vti0\x00', {}, 'vxcan1\x00'}}]}, @common=@inet=@HMARK={0x5c, 'HMARK\x00', 0x0, {@ipv6=@remote}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x5a8) 17:52:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "a079856a1ab789f3", "3e344cda00", '?\x00', "0498ff01000006e0"}, 0x28) close(r1) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 17:52:56 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fb1\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) r0 = socket$key(0xf, 0x3, 0x2) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000280), 0x4) pwritev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) close(0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x3e8, 0x0, 0xc700, 0x294, 0x154, 0x294, 0x320, 0x378, 0x2000, 0x320, 0x378, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a], 0x0, 0xec, 0x154, 0x52020000, {}, [@common=@inet=@ecn={{0x24, 'ecn\x00'}, {0x21}}, @common=@inet=@dscp={{0x24, 'dscp\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@ipv6={@private2, @private1, [], [], 'vlan1\x00', 'sit0\x00'}, 0x0, 0xa4, 0x1cc}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:fixed_disk_device_t:s0\x00'}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x444) 17:52:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000680)=@newae={0x40, 0x12, 0x1, 0x0, 0x0, {{@in=@private, 0x0, 0x0, 0x6c}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x40}}, 0x0) [ 482.064171][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:52:56 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x19, 0x0, 0x0) [ 482.175438][T17397] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 17:52:57 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a9, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 17:52:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10040, 0x0) 17:52:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x2, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x92}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:52:59 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a9, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 17:52:59 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x12, 0x0, 0x0) 17:52:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x108) 17:52:59 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x17, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x108) 17:52:59 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x18, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x108) 17:52:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000300), 0x4) 17:52:59 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg(r0, &(0x7f0000007a80)=[{{&(0x7f0000001180)=@sco={0x1f, @none}, 0xfffffffffffffd7a, 0x0}}], 0x1, 0x0) 17:52:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736616e0ca00088020000400000400f80000200040000300000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fff", 0x9, 0x10000}], 0x0, &(0x7f0000011200)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:52:59 executing program 2: syz_genetlink_get_family_id$net_dm(0xfffffffffffffffd) 17:52:59 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a9, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 17:52:59 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x1, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x108) 17:53:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x2, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x92}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:02 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x19, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x108) 17:53:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x42, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x108) 17:53:02 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) accept(r0, 0x0, 0x0) 17:53:02 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x16, 0x0, 0x0) 17:53:02 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a9, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 17:53:02 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:53:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f000000b5c0)=[{{&(0x7f0000000000)=@in={0x2, 0x4e21, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000001280)=[{0x10, 0x117}], 0x10}}], 0x1, 0x0) 17:53:02 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x33, 0x0, 0x0) 17:53:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000012000100"/20, @ANYRES64=r0], 0x30}}, 0x0) 17:53:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0xb, 0x0, 0x0) 17:53:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000026c0)={{0x2, 0x0, @local}, {0x0, @broadcast}, 0x16, {0x2, 0x0, @dev}, 'veth0_to_batadv\x00'}) [ 488.294485][T17484] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 17:53:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x39, 0x0, 0x0) 17:53:05 executing program 3: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd27) 17:53:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x2, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x92}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:05 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x14, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x108) 17:53:05 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r0, 0x29, 0x8, &(0x7f0000004c40), &(0x7f0000004c80)=0x14) 17:53:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg(r0, &(0x7f0000007a80)=[{{&(0x7f0000002780)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000002840)=[{&(0x7f00000000c0)="5cee1b4d90ca81589e08413167cf371ec940fd7f7793653883e5621fd7d2bd7014c0fa4d014ab31267c8070574d40c3855224ae401778a81ea534067d81a8511de2dc90110215ed274994fb1f67f948f355130da70456cfe2f66313c7d20d059fa3ebd9884c6f8f1c91136a1763f8f2b11290723bf3efc86848a758338bbf53240f84af2224881a01982cece0538e3254bf521783cb3085003e3804c34cb44b47f8c522b3ae93fcc20f01d8b1087dba3d824eef0b1ee1c40bd", 0xb9}, {0x0}, {&(0x7f0000006c40)="e4", 0x1}], 0x1b}}], 0x7, 0x0) 17:53:05 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x3e, 0x0, 0x0) 17:53:05 executing program 0: clock_gettime(0x5, &(0x7f0000005b80)) 17:53:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@getlink={0x34, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'netdevsim0\x00'}]}, 0x34}}, 0x0) 17:53:05 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)) 17:53:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x40, 0x1, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x2c, 0x2, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}]}]}, 0x40}}, 0x0) 17:53:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x18, 0x1, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x4}]}, 0x18}}, 0x0) 17:53:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000240)={'batadv_slave_0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 491.344135][T17516] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 17:53:06 executing program 4: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x2, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "52b755a6"}, 0x0, 0x0, @userptr}) [ 491.394083][T17516] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:53:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:08 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000001140)) 17:53:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x1264, 0xffffffffffffffff) 17:53:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x40, 0x1, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x2c, 0x2, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}]}]}, 0x40}}, 0x0) 17:53:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, 0x1, 0x9, 0x3}, 0x14}}, 0x0) 17:53:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "df"}]}}, &(0x7f0000000380)=""/191, 0x2a, 0xbf, 0x1}, 0x20) 17:53:08 executing program 4: socket$inet(0x2, 0xa, 0x4) 17:53:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x40, 0x1, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x2c, 0x2, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}]}]}, 0x40}}, 0x0) [ 494.182103][T17538] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 494.209628][T17538] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:53:08 executing program 0: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x80000140) 17:53:08 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000040)='/dev/loop#\x00') 17:53:09 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000002c40)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) [ 494.326477][T17551] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 494.353062][T17551] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:53:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x5412, &(0x7f0000003c80)) 17:53:11 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:53:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, &(0x7f0000000140)) 17:53:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x1c, r1, 0xa1ac1f17d3479a3, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 17:53:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000180)=@gcm_128={{0x304}, "e9e0473f50240a54", "e8fc0000000000000080020592ca00", '/\x00', "17ce2611daee05f7"}, 0x28) sendto$inet6(r1, 0x0, 0x0, 0x40, 0x0, 0x0) 17:53:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = openat$full(0xffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xfe, 0xfd, 0x40, 0x1, 0x0, 0x0, 0x20260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x9, 0x17}, 0x2, 0x0, 0x2, 0x2, 0x0, 0x800, 0x7}, 0x0, 0x8, r4, 0xa) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x302, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', 0x0, 0x4, 0x5, &(0x7f00000006c0)=[{&(0x7f00000002c0)="a6f3bb10da60471f4db1d080df576196ce954242b9ad45ca88fe75f39899619247611bd3ac4f54be4b8dee3927135c70c245413d9f4c381cac7eea8436cf4119859c5bc331ba42f8924695162def29623add061d25e7b353328ec1d129c8bede173a1faa9f068435aa51d36981cf6f615d2f93e915967f68f41fe48a79a3106692a60775aa137e47c55608bd4bcd", 0x8e, 0xfffff1a0}, {0x0, 0x0, 0x401}, {&(0x7f00000003c0)="926870ed70627a88", 0x8, 0x3}, {&(0x7f0000000400), 0x0, 0x8}, {&(0x7f00000004c0)="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", 0xfd, 0x1f}], 0x2000081, 0x0) 17:53:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440), 0x8, 0x10, 0x0}, 0x78) [ 497.252170][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:53:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, &(0x7f0000000100)) [ 497.347720][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 497.360005][T17583] loop3: detected capacity change from 264192 to 0 17:53:12 executing program 0: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5543, 0x5, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x50, 0x0, [{{0x9, 0x4, 0x0, 0xaa, 0x2, 0x3, 0x1, 0x0, 0x9, {0x9, 0x21, 0x98, 0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x40, 0x7, 0x0, 0x2}}}}}]}}]}}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f0000000180)=@lang_id={0x4}}, {0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x410}}]}) [ 497.450340][T17590] loop3: detected capacity change from 264192 to 0 17:53:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:12 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = syz_io_uring_setup(0x87, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ee8000/0x2000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 17:53:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = openat$full(0xffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xfe, 0xfd, 0x40, 0x1, 0x0, 0x0, 0x20260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x9, 0x17}, 0x2, 0x0, 0x2, 0x2, 0x0, 0x800, 0x7}, 0x0, 0x8, r4, 0xa) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x302, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', 0x0, 0x4, 0x5, &(0x7f00000006c0)=[{&(0x7f00000002c0)="a6f3bb10da60471f4db1d080df576196ce954242b9ad45ca88fe75f39899619247611bd3ac4f54be4b8dee3927135c70c245413d9f4c381cac7eea8436cf4119859c5bc331ba42f8924695162def29623add061d25e7b353328ec1d129c8bede173a1faa9f068435aa51d36981cf6f615d2f93e915967f68f41fe48a79a3106692a60775aa137e47c55608bd4bcd", 0x8e, 0xfffff1a0}, {0x0, 0x0, 0x401}, {&(0x7f00000003c0)="926870ed70627a88", 0x8, 0x3}, {&(0x7f0000000400), 0x0, 0x8}, {&(0x7f00000004c0)="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", 0xfd, 0x1f}], 0x2000081, 0x0) 17:53:12 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) [ 497.649041][T17604] loop4: detected capacity change from 16383 to 0 [ 497.729121][T17604] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) [ 497.769289][T17604] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 497.832148][T17628] loop3: detected capacity change from 264192 to 0 [ 497.879750][T17604] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 497.998381][T17604] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/425/file0 supports timestamps until 2038 (0x7fffffff) [ 498.085355][ T7] usb usb1-port1: Cannot enable. Maybe the USB cable is bad? [ 498.415649][ T7] usb usb1-port1: Cannot enable. Maybe the USB cable is bad? [ 498.435165][ T7] usb usb1-port1: attempt power cycle [ 499.125470][ T7] usb usb1-port1: Cannot enable. Maybe the USB cable is bad? [ 499.436162][ T7] usb usb1-port1: Cannot enable. Maybe the USB cable is bad? [ 499.443858][ T7] usb usb1-port1: unable to enumerate USB device 17:53:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0xc, &(0x7f0000000040)='\b', 0x1) 17:53:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:14 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:53:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) tee(r1, 0xffffffffffffffff, 0x0, 0x1) 17:53:15 executing program 5: mq_unlink(&(0x7f0000000140)='./cgroup.cpu/syz0\x00') [ 500.496786][T17653] loop4: detected capacity change from 16383 to 0 17:53:15 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x15, 0x0, 0x0) 17:53:15 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000004300)='/dev/vcsa#\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x2) 17:53:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x1600bd80, &(0x7f0000000040)="0822993dadaabaa1ca8ecda1", 0xc) [ 500.659590][T17653] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) 17:53:15 executing program 5: setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0xfffffffffffffeea) 17:53:15 executing program 3: getgroups(0x2, &(0x7f0000000040)=[0x0, 0xffffffffffffffff]) setregid(r0, 0xffffffffffffffff) [ 500.753039][T17653] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) 17:53:15 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) [ 500.832913][T17653] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 500.872410][T17653] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/426/file0 supports timestamps until 2038 (0x7fffffff) 17:53:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x4a, &(0x7f0000000040)={'filter\x00', 0x2, [{}, {}]}, 0x44) 17:53:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000000)=0x24) 17:53:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x402c5828, &(0x7f0000000040)={'nr0\x00', {0x2, 0x0, @multicast2}}) 17:53:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:18 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) 17:53:18 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x24, &(0x7f0000000040)="0822993dadaabaa1ca8ecda1", 0xc) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x0, 'macvlan0\x00', {0x4}, 0x20}) 17:53:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003380)=[@rights={{0x10, 0x1, 0x1, [r1]}}], 0x10}, 0x0) 17:53:18 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, 0x0, 0x0) [ 503.408927][T17706] loop4: detected capacity change from 16383 to 0 17:53:18 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) [ 503.520213][T17706] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) 17:53:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000100)="12d8f6a8070000000000008b528ae008aa94d8ba7719a81f2bc39fe65de7181f5335032c2b0aa98076bd7c3bf8a55b93cfb4b453e6b60907f9e08746c3d222b47148f5f50f5ed7047b636cd197d5ca372f6f2e929902a52c2111fcca77ee9e82e4be0574a1c79da38c757882b100e751d3fc6838fe7fbc398afde21a32bd248f60056a0f94153aff2560651b", 0x8c) [ 503.572735][T17706] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 503.600224][T17706] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:53:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) [ 503.616582][T17706] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/427/file0 supports timestamps until 2038 (0x7fffffff) [ 503.770646][T17733] loop4: detected capacity change from 16383 to 0 [ 503.800918][T17733] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) [ 503.813907][T17733] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 503.827178][T17733] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 503.839923][T17733] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/428/file0 supports timestamps until 2038 (0x7fffffff) 17:53:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:21 executing program 5: r0 = openat$urandom(0xffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000001c0)={0x7ff}) 17:53:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) 17:53:21 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) 17:53:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, &(0x7f0000000040)="0822993d", 0x4) 17:53:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:21 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5441, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x4) 17:53:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:53:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x3ff, 0x6, 0x4, 0x140}, 0x40) 17:53:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1a}, 0x40) [ 506.477298][T17757] loop4: detected capacity change from 16383 to 0 17:53:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f0000000100)) [ 506.693270][T17772] loop4: detected capacity change from 16383 to 0 17:53:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:53:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:24 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5441, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x4) 17:53:24 executing program 5: syz_open_dev$vcsa(0x0, 0x0, 0x0) r0 = io_uring_setup(0x78d0, &(0x7f0000000000)) syz_open_dev$vcsa(0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) 17:53:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:53:24 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) 17:53:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x12, 0x0, 0x0) [ 509.602264][T17816] loop4: detected capacity change from 16383 to 0 17:53:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0xb, &(0x7f0000000040)='\b', 0x1) 17:53:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:53:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x12, &(0x7f0000000040)='\b', 0x1) 17:53:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) [ 510.111749][T17855] loop4: detected capacity change from 16383 to 0 17:53:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:27 executing program 3: prctl$PR_SET_SPECULATION_CTRL(0x2, 0x815e000) 17:53:27 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5441, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x4) 17:53:27 executing program 5: r0 = openat$vfio(0xffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$VFIO_IOMMU_GET_INFO(r0, 0x402c5828, 0x0) 17:53:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:53:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(r0, 0x1) 17:53:27 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000000)="bf", 0x1}], 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) shutdown(r0, 0x1) dup2(r1, r0) [ 512.793321][T17872] loop4: detected capacity change from 16383 to 0 17:53:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000f40)=ANY=[@ANYBLOB="1c1c4e210180000000000000000000000000ffff"], 0x98) 17:53:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:27 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5441, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x4) 17:53:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) [ 512.985165][T17895] loop4: detected capacity change from 16383 to 0 17:53:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:30 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000200), &(0x7f00000002c0)=0x98) 17:53:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)) 17:53:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:53:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, &(0x7f00000014c0), &(0x7f0000001500)=0x4) 17:53:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:53:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x11, &(0x7f0000000000), 0x4) 17:53:30 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000000)="bff4c9e5a4077da4e269c3ebc9f190c401e6899b3278162bb43f35e0a79ada943ba83ed0571f65aecff6", 0x2a}, {&(0x7f0000000080)="61655535fd822f38482ca80c816848cfc126e9d3ede780d488b2ba869165bcf57d4c76e7096a6078f9ae89fcb7e224566c0fc1b21c0425d3848708af8dec7b7db66e5b580f7a5249beaf0a823641cb4453ff9269b4b5582684281d65722b25fdd6d0a6d2e7ca199fdb1078bd3c2032696dca880d71d490a55f62da61a8462f7183fc739c016999dbcf482397b1a428c0d45fc05c11036c6d45f2ab321310bbf1404078d720e4ec281cf487fbf1d7d0e4a062", 0xb2}, {&(0x7f0000000680)="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", 0x3e1}], 0x3}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 17:53:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)) 17:53:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000180)=ANY=[@ANYBLOB="1c1c4e23000000000000000004"], &(0x7f0000000140)=0x98) 17:53:30 executing program 5: syz_emit_ethernet(0x22, &(0x7f0000000100)={@broadcast, @local, @val, {@ipv4}}, 0x0) 17:53:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)) 17:53:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:33 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f0000001140)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 17:53:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f00000016c0)={0x0, 0x0, 0x40, 0x2}, 0x10) 17:53:33 executing program 2: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:53:33 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000001740)=ANY=[@ANYRESDEC, @ANYRES32=0xffffffffffffffff], &(0x7f0000001700)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f0000000140)={r4}, &(0x7f00000001c0)=0x8) 17:53:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}], 0x0, &(0x7f0000000500)) 17:53:33 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000), 0x8) [ 518.798197][T17978] loop4: detected capacity change from 256 to 0 [ 518.823352][T17978] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) 17:53:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}], 0x0, &(0x7f0000000500)) 17:53:33 executing program 5: sigaltstack(&(0x7f0000ffc000/0x1000)=nil, 0x0) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5) 17:53:33 executing program 2: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:53:33 executing program 0: syz_emit_ethernet(0x9a, &(0x7f0000000180)={@local, @random="6098b46d5703", @val, {@ipv4}}, 0x0) 17:53:33 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, &(0x7f0000000080)="10", 0x1, 0x100, &(0x7f0000000180)={0x10, 0x2}, 0x10) [ 519.077522][T17999] loop4: detected capacity change from 256 to 0 [ 519.113964][T17999] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) 17:53:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:36 executing program 3: r0 = socket(0x1c, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, @in, 0x0, 0xf4c, 0x392}, 0x98) 17:53:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f00000001c0)="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", 0xdd9, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 17:53:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}], 0x0, &(0x7f0000000500)) 17:53:36 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, &(0x7f0000001540), &(0x7f0000001580)=0x8) 17:53:36 executing program 2: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) [ 521.937084][T18029] loop4: detected capacity change from 256 to 0 [ 521.987382][T18029] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) 17:53:36 executing program 0: syz_emit_ethernet(0xfff, &(0x7f0000000180)={@broadcast, @empty, @val, {@ipv6}}, 0x0) 17:53:36 executing program 3: munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 17:53:36 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000040)={0x7ff}, 0x10) 17:53:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0}], 0x0, &(0x7f0000000500)) 17:53:37 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f0000001140)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 17:53:37 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) [ 522.342404][T18051] loop4: detected capacity change from 256 to 0 [ 522.382496][T18051] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) 17:53:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000280)="be29a0cd661386a737220cd078251abd755448a2e6230e63879d2e10c34d01781748dd7f1dd21c47592379ed92121a72afd311a4711dcba7c0c607cb78a18c7c4904ca2e68d1d18c9ef62030709903cd6543946af268327716040770cce4eb41efe871e0c5cabb4d76528e1a374192b77dd2fe1461473d3ad34f9fa7e73e0616d00bc478f60d0a0547110be035226c52513717bbd0c16d9b56f38dc9a4cd515c9a40e1b6b93829e6", 0xa8) 17:53:39 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:53:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0}], 0x0, &(0x7f0000000500)) 17:53:39 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 17:53:39 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) [ 525.017178][T18081] loop4: detected capacity change from 256 to 0 17:53:39 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 17:53:39 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) [ 525.073734][T18081] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) 17:53:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:39 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:53:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0}], 0x0, &(0x7f0000000500)) 17:53:39 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f00000000c0)=@un=@abs={0x8}, 0x8) 17:53:40 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @private}, {0x1, @random="13df6d072564"}, 0x4, {0x2, 0x0, @broadcast}, 'veth1_to_batadv\x00'}) 17:53:40 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x19, 0x0, 0x32) [ 525.387441][T18108] loop4: detected capacity change from 256 to 0 17:53:40 executing program 0: r0 = socket(0xa, 0x3, 0x4) getsockname$llc(r0, 0x0, &(0x7f0000000080)) 17:53:40 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x10, &(0x7f0000000000), 0x4) [ 525.460237][T18108] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) 17:53:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @private1}]}, &(0x7f00000000c0)=0x10) 17:53:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x1}]}}, &(0x7f00000001c0)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 17:53:40 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x41, &(0x7f0000000000), 0x4) [ 525.783884][T18134] loop4: detected capacity change from 16383 to 0 [ 525.918545][T18134] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -116) [ 525.931317][T18134] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 525.944827][T18134] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/444/file0 supports timestamps until 2038 (0x7fffffff) 17:53:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000280)) 17:53:43 executing program 0: r0 = socket$can_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x891d, &(0x7f0000000080)={'wlan0\x00'}) 17:53:43 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:53:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:43 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000), 0x4) 17:53:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x28, 0x7, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 17:53:43 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:53:43 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg(r0, &(0x7f0000001640)=[{{&(0x7f00000000c0)=@un=@abs, 0x80, 0x0, 0x0, &(0x7f0000001680)=ANY=[], 0x10a0}}], 0x1, 0x0) [ 528.430073][T18162] loop4: detected capacity change from 16383 to 0 17:53:43 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) [ 528.566970][T18162] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -116) [ 528.648737][T18162] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 528.686017][T18162] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/445/file0 supports timestamps until 2038 (0x7fffffff) 17:53:43 executing program 5: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) 17:53:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) [ 528.912844][T18190] loop4: detected capacity change from 16383 to 0 [ 528.971046][T18190] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -116) [ 528.989263][T18190] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 529.010858][T18190] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/446/file0 supports timestamps until 2038 (0x7fffffff) 17:53:46 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_1\x00', {0x2, 0x0, @dev}}) 17:53:46 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 17:53:46 executing program 3: socket$bt_bnep(0x1f, 0x3, 0x4) 17:53:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:46 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r1, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f00000004c0)={0x28, r0, 0x35, 0x0, 0x0, {{}, {@val={0x8, 0x6}, @val={0xc}}}}, 0x28}}, 0x0) 17:53:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {0x0, 0x0, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:46 executing program 0: r0 = socket$can_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8916, &(0x7f0000000080)={'wlan0\x00'}) 17:53:46 executing program 3: sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=ANY=[@ANYBLOB="bc010000", @ANYRES16, @ANYBLOB="00002dbd7000fedbdf250100000008000100", @ANYRES32=0x0, @ANYBLOB="0801028040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000002000008000600", @ANYRES32, @ANYBLOB="4c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006e"], 0x1bc}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 531.439025][T18210] loop4: detected capacity change from 16383 to 0 17:53:46 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) 17:53:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x1, 0x70bd26, 0x25dfdbfd, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) 17:53:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000006380)={0x0, 0x0, &(0x7f0000006340)={&(0x7f00000062c0)={0x14}, 0x14}}, 0x0) [ 531.494023][T18210] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -116) [ 531.507406][T18210] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 531.518360][T18210] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/447/file0 supports timestamps until 2038 (0x7fffffff) 17:53:46 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x35, &(0x7f0000000000), 0x4) 17:53:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {0x0, 0x0, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0xd, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 531.724313][T18234] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 531.769888][T18239] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 531.792161][T18238] loop4: detected capacity change from 16383 to 0 [ 531.852237][T18238] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -116) [ 531.872472][T18238] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 531.883641][T18238] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/448/file0 supports timestamps until 2038 (0x7fffffff) 17:53:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xbe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:49 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) 17:53:49 executing program 3: socket(0x2c, 0x3, 0xd9bc) 17:53:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x25, 0x0, 0x0) 17:53:49 executing program 0: r0 = socket$can_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8903, &(0x7f0000000080)={'wlan0\x00'}) 17:53:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {0x0, 0x0, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x11, &(0x7f00000016c0), 0x4) [ 534.513651][T18263] loop4: detected capacity change from 16383 to 0 17:53:49 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) [ 534.574994][T18263] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -116) 17:53:49 executing program 3: socket(0x18, 0x0, 0x401) 17:53:49 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x1) 17:53:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f00000016c0), 0x4) [ 534.632105][T18263] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 534.645324][T18263] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/449/file0 supports timestamps until 2038 (0x7fffffff) 17:53:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000003940)={0x0, 0x0, &(0x7f0000003900)={&(0x7f0000003a40)={0x38, r1, 0x5e12f33b22d6b42f, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x38}}, 0x0) 17:53:52 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000000100)={0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="980000000acf80c7f8dc641c1e143c0a76f7d30a7c8a92d92af3d58f088bffff0daae13bb7860bb484b8cddff90879884ca8c1b12c2a5686c2bb5537d210a34f970858ac188faf909952034b0892000ea1870834382592da45704af8c1eb4a0823acdb018df871068ea8f8a16b7055294e25c60644df769d7dd9593c8ec2", @ANYRES16=0x0, @ANYBLOB="000000000000000000004f00000008000300", @ANYRES32=0x0, @ANYBLOB="7c007a800c000300676c72480ea8d9c708000400e2e700001c000200c11d96405f5d29b550f369f6e95d3ff3b598f988e4fea56d08000400000000000c0003000af00ef2b4a7d2900c000300b0cfe39e01a6978c0c000300dde645e2497d38b714000100befa5b15fef4fea20a02a86fbc63eb7808000400d7b20000"], 0x98}}, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x1588}, 0xfffffffffffffe58) socket(0x4, 0x3, 0x8) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$rose(r1, 0x104, 0x7, &(0x7f0000006080), &(0x7f00000060c0)=0x4) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000240)=0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x1ff) r2 = socket(0x29, 0x3, 0x2) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_TDLS_MGMT(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x74, r3, 0x800, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x1, 0x65}}}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x3f}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x5}, @NL80211_ATTR_IE={0x3a, 0x2a, [@ht={0x2d, 0x1a, {0x40, 0x2, 0x4, 0x0, {0x8, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x300, 0x7f, 0x3}}, @peer_mgmt={0x75, 0x18, {0x1, 0x400, @val=0xfff, @val=0x22, @val="3ef76a4baf9382b2687a6ab27013280d"}}]}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x15}]}, 0x74}, 0x1, 0x0, 0x0, 0x4001}, 0x44000) 17:53:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:52 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, 0x0, 0x0) 17:53:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140), 0x0, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:52 executing program 5: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x3}, 0x4) 17:53:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000004e80)={0x0, 0x0, &(0x7f0000004e40)={&(0x7f0000000280)={0x18, 0x1, 0x1, 0x301, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) [ 537.580363][T18300] loop4: detected capacity change from 16383 to 0 [ 537.690075][T18300] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -116) 17:53:52 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, 0x0, 0x0) 17:53:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f00000016c0)=0xffffff80, 0x4) 17:53:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140), 0x0, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) [ 537.733314][T18300] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 537.749779][T18300] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/450/file0 supports timestamps until 2038 (0x7fffffff) 17:53:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000003c0)) 17:53:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:53:52 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_opts(r0, 0x0, 0x31, 0x0, &(0x7f00000007c0)) 17:53:52 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, 0x0, 0x0) [ 537.911599][T18325] loop4: detected capacity change from 16383 to 0 [ 537.978393][T18325] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -116) [ 538.025178][T18325] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 538.039529][T18325] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/451/file0 supports timestamps until 2038 (0x7fffffff) 17:53:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:55 executing program 0: getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) 17:53:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000003c0), &(0x7f0000000400)=0xe) 17:53:55 executing program 2: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000480)) 17:53:55 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x2, &(0x7f0000000040)) 17:53:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140), 0x0, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:55 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x11, 0x3, &(0x7f0000000f80)=@framed, &(0x7f0000001000)='syzkaller\x00', 0x0, 0x6, &(0x7f0000001040)=""/6, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:53:55 executing program 0: syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x8018c8, &(0x7f0000000300)) [ 540.653654][T18355] loop4: detected capacity change from 16383 to 0 17:53:55 executing program 3: syz_genetlink_get_family_id$ethtool(&(0x7f000000f500)='ethtool\x00') 17:53:55 executing program 0: sendmsg$NL80211_CMD_GET_COALESCE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$bfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)='Y', 0x1}, {&(0x7f0000000240)="cde6934657d67ae753", 0x9, 0x7f}], 0x0, 0x0) 17:53:55 executing program 5: r0 = socket$can_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x58010, r0, 0xdb7a5000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) 17:53:55 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000240)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0x314aaee635b9c1b6, 0x0, 0x0, 0xfffffffffffffeeb) write(0xffffffffffffffff, &(0x7f0000000000)="15000000140007", 0x7) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="ffad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='6', 0x10a69, 0x10, 0x0, 0x4b6ae4f95a5de3b2) [ 540.771069][T18355] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -116) [ 540.821838][T18355] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 540.834330][T18355] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/452/file0 supports timestamps until 2038 (0x7fffffff) [ 540.923645][T18379] netlink: 41582 bytes leftover after parsing attributes in process `syz-executor.2'. [ 540.992554][T18382] netlink: 41582 bytes leftover after parsing attributes in process `syz-executor.2'. 17:53:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:53:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8", 0x12, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:53:58 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xffff, 0x0, 0x0) 17:53:58 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000000)=@random={'system.', '\x00\x00\x00\x00\x00\x00\x00\x1fnel/debug/binder/state\x00'}, 0x0, 0xfffffffffffffea7, 0x0) 17:53:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840), 0x0, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000000340)="7f7458a443e9c4a1d10a7d67acc8a4da8c669299958ab75259458dfba4c342bbe41beeb2bbf65092142187e8031d9896fc97bb547176be4b9cf951557ecad2ef3c44632c06aaf28dcbd78880ae80338a5cc60964f56f51f89d0327d1ad4346cdac2efb82d06393759782b5592cc420589c788e67d215b255c94bdd53544186f9", 0x80}, {&(0x7f0000000400)="dc7d1bef72a8865c877ad747ab61a36936d662f663d2aa1f8a8759ddb4163c473b279d6ef05d66e390a5a943ea852966b50c61189455ffd08d6e47fcff5ffae57ca5ee527d733338a75c22b3cb2ca7f96c12abb05dc7cfa9f7d313268679b7f8f8dd3ebb7d0fdbb9b5645fdded4ecc5ab0e13249570ed65a45cba5cac117ac03996f908069505aebd75bc9b6a4d4c794a484b19d241c009055f497f315f76ac50f134a98b8e503d11d2b9b3a40", 0xad}], 0x2, 0xe) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x508, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x73}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x25, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:53:58 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) writev(r0, &(0x7f0000000400)=[{&(0x7f00000002c0)='6KW~', 0x4}], 0x1) [ 543.709520][T18396] loop4: detected capacity change from 16383 to 0 17:53:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x1, 0x0, 0x6}, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x18000, 0x0) clone(0x20040103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={0x0, 0xb0}}, 0x40804) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x44}, 0x890d) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_SET_DIRECT_IO(r4, 0x4c08, 0x0) poll(&(0x7f00000002c0)=[{r2, 0x402e}, {0xffffffffffffffff, 0x100}, {r1, 0x4}, {r5, 0x210b}, {r5, 0x40}, {r3, 0x2}], 0x6, 0x5) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r6, r4, 0x0, 0x20000000000000d8) [ 543.790721][T18396] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) [ 543.810178][T18402] loop5: detected capacity change from 127 to 0 17:53:58 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') getdents64(r0, &(0x7f0000001180)=""/65, 0x21) [ 543.831450][T18396] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 543.844566][T18396] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 543.856832][T18396] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/453/file0 supports timestamps until 2038 (0x7fffffff) 17:53:58 executing program 3: add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) [ 543.884612][ T35] audit: type=1326 audit(1611165238.594:10): auid=0 uid=0 gid=0 ses=4 subj=_ pid=18415 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 17:53:58 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) mmap$binder(&(0x7f0000feb000/0x13000)=nil, 0x13000, 0x1, 0x11, r0, 0x0) 17:53:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x1, 0x0, 0x6}, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x18000, 0x0) clone(0x20040103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={0x0, 0xb0}}, 0x40804) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x44}, 0x890d) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_SET_DIRECT_IO(r4, 0x4c08, 0x0) poll(&(0x7f00000002c0)=[{r2, 0x402e}, {0xffffffffffffffff, 0x100}, {r1, 0x4}, {r5, 0x210b}, {r5, 0x40}, {r3, 0x2}], 0x6, 0x5) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r6, r4, 0x0, 0x20000000000000d8) 17:53:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8", 0x12, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) [ 544.047675][ T35] audit: type=1326 audit(1611165238.754:11): auid=0 uid=0 gid=0 ses=4 subj=_ pid=18427 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 [ 544.205008][T18439] loop4: detected capacity change from 16383 to 0 [ 544.273882][T18439] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) [ 544.305709][T18439] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 544.342936][T18439] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 544.371642][T18439] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/454/file0 supports timestamps until 2038 (0x7fffffff) 17:54:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getrandom(&(0x7f00000000c0)=""/4096, 0x1000, 0x2) 17:54:01 executing program 5: syz_open_dev$sndctrl(&(0x7f00000003c0)='/dev/snd/controlC#\x00', 0x7, 0x40040) 17:54:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x1, 0x0, 0x6}, 0x0) clone(0x20040103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xb0}}, 0x40804) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x890d) socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x0) poll(0x0, 0x0, 0x5) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x20000000000000d8) 17:54:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:54:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x1, 0x0, 0x6}, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x18000, 0x0) clone(0x20040103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={0x0, 0xb0}}, 0x40804) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x44}, 0x890d) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_SET_DIRECT_IO(r4, 0x4c08, 0x0) poll(&(0x7f00000002c0)=[{r2, 0x402e}, {0xffffffffffffffff, 0x100}, {r1, 0x4}, {r5, 0x210b}, {r5, 0x40}, {r3, 0x2}], 0x6, 0x5) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r6, r4, 0x0, 0x20000000000000d8) 17:54:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8", 0x12, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:01 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000100)) 17:54:01 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000003e80)=@req3, 0x1c) [ 546.785367][ T35] audit: type=1326 audit(1611165241.494:12): auid=0 uid=0 gid=0 ses=4 subj=_ pid=18457 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 [ 546.820208][T18462] loop4: detected capacity change from 16383 to 0 17:54:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x1, 0x0, 0x6}, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x18000, 0x0) clone(0x20040103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={0x0, 0xb0}}, 0x40804) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x44}, 0x890d) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_SET_DIRECT_IO(r4, 0x4c08, 0x0) poll(&(0x7f00000002c0)=[{r2, 0x402e}, {0xffffffffffffffff, 0x100}, {r1, 0x4}, {r5, 0x210b}, {r5, 0x40}, {r3, 0x2}], 0x6, 0x5) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r6, r4, 0x0, 0x20000000000000d8) [ 546.916655][T18462] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) 17:54:01 executing program 0: socketpair(0x2b, 0x801, 0x0, 0x0) [ 546.960279][T18462] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 546.977632][T18462] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:54:01 executing program 3: syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x100000020000a, 0x2) 17:54:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x0, 0x0) dup3(r0, r1, 0x0) accept$packet(r1, 0x0, 0x0) [ 547.073022][ T35] audit: type=1326 audit(1611165241.784:13): auid=0 uid=0 gid=0 ses=4 subj=_ pid=18485 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 [ 547.102457][T18462] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/455/file0 supports timestamps until 2038 (0x7fffffff) 17:54:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd32", 0x1b, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:01 executing program 2: mq_open(&(0x7f0000000180)='^\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:54:02 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00', 0x0, 0x0, 0x0) [ 547.365267][T18505] loop4: detected capacity change from 16383 to 0 [ 547.448468][T18505] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) [ 547.465103][T18505] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 547.481410][T18505] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 547.494771][T18505] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/456/file0 supports timestamps until 2038 (0x7fffffff) 17:54:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:54:04 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000540)={0xc, 0x0, &(0x7f0000000440)=[@free_buffer], 0x0, 0x0, 0x0}) 17:54:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/142) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 17:54:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x0, 0x0) dup3(r0, r1, 0x0) getsockname$packet(r1, 0x0, 0x0) 17:54:04 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x24, 0x0, 0x800, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f77], 0x0, 0x200102}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:54:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd32", 0x1b, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) [ 549.874262][T18527] loop4: detected capacity change from 16383 to 0 17:54:04 executing program 3: request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0) 17:54:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000400)=[@text64={0x40, &(0x7f00000000c0)="660f388029410f01c22ef3400fc737470f06b805000000b9b22900000f01c10f01d1f2430f1b09440f20c03504000000440f22c0b9341001c0b8c5ec0000ba000000000f3066ba4000ed", 0x4a}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:54:04 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 17:54:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 550.037316][T18527] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) 17:54:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd32", 0x1b, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) [ 550.095854][T18527] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 550.109149][T18527] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 550.122067][T18527] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/457/file0 supports timestamps until 2038 (0x7fffffff) 17:54:04 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x0, 0x9, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "87fbd627"}, 0x0, 0x0, @planes=&(0x7f0000000080)={0x0, 0x0, @userptr}, 0x4}) 17:54:04 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f0000000080)=""/65, 0x41) 17:54:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000056b000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 550.303061][T18562] loop4: detected capacity change from 16383 to 0 17:54:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000400)=[@text64={0x40, &(0x7f00000000c0)="660f388029410f01c22ef3400fc737470f06b805000000b9b22900000f01c10f01d1f2430f1b09440f20c03504000000440f22c0b9341001c0b8c5ec0000ba000000000f3066ba4000ed", 0x4a}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:54:05 executing program 3: request_key(&(0x7f0000001300)='keyring\x00', &(0x7f0000001340)={'syz', 0x3}, &(0x7f0000001380)='*[\t/%)\x00', 0x0) [ 550.400886][T18562] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) [ 550.436850][T18562] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) 17:54:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 550.480960][T18562] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:54:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000400)=[@text64={0x40, &(0x7f00000000c0)="660f388029410f01c22ef3400fc737470f06b805000000b9b22900000f01c10f01d1f2430f1b09440f20c03504000000440f22c0b9341001c0b8c5ec0000ba000000000f3066ba4000ed", 0x4a}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:54:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad092", 0x1f, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:05 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x2) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000340)={0x0, 0x0, 0x4, {0x1, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) [ 550.539506][T18562] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/458/file0 supports timestamps until 2038 (0x7fffffff) 17:54:05 executing program 3: ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, &(0x7f0000000180)=0x7) r0 = syz_open_dev$sndctrl(&(0x7f0000001040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000600)=ANY=[@ANYBLOB="076e8600d2d7390232a3f5d48a098ae4849caac639ecafadd6e024133937d2d359bd39b01f000000a0fe4a5d22168901af08db1333fc10cadf6809f064a39d08b6928ca9f2208ed8ed4d33f8bb480b5cf98269ecb2e4e7d2f0b8b093c1490121c7dec35868ff793d2e46e28320df276732878bc72a4fde32ac7946459c4a42c92c4a794235a4920e8395275454d572d5f24b2ba0021044d159500865a5a04ff00000000000000000000000000000f9ec4d0e6ccbccf1f8112e2748a8cf51082c8cb778", @ANYRES16=0x0, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) fsetxattr(r1, &(0x7f00000000c0)=@random={'osx.', '/dev/loop-control\x00'}, 0x0, 0x0, 0x2) [ 550.797245][T18600] loop4: detected capacity change from 16383 to 0 [ 550.896638][T18600] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) [ 550.909931][T18600] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 550.936166][T18600] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 550.970612][T18600] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/459/file0 supports timestamps until 2038 (0x7fffffff) 17:54:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000400)=[@text64={0x40, &(0x7f00000000c0)="660f388029410f01c22ef3400fc737470f06b805000000b9b22900000f01c10f01d1f2430f1b09440f20c03504000000440f22c0b9341001c0b8c5ec0000ba000000000f3066ba4000ed", 0x4a}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:54:07 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448cb, &(0x7f0000000280)) 17:54:07 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 17:54:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:54:07 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000080)={0x0, 0x0, 0x0, {0x4, @sliced}}) 17:54:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad092", 0x1f, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) [ 553.215454][T18639] loop4: detected capacity change from 16383 to 0 [ 553.239606][ T2191] block nbd0: Attempted send on invalid socket [ 553.246901][ T2191] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 17:54:08 executing program 3: r0 = inotify_init1(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) [ 553.266064][T18634] XFS (nbd0): SB validate failed with error -5. [ 553.298842][T18639] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) [ 553.340888][T18639] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) 17:54:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40014043, 0x0) 17:54:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, 0x0) [ 553.388512][T18639] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 553.459173][T18639] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/460/file0 supports timestamps until 2038 (0x7fffffff) 17:54:08 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 17:54:08 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, &(0x7f0000000140)=[@dstype3={0x7, 0xb}], 0x1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000280)="c4e17c2b368fe8a0a2c70e660f38823510722678b8010000000f01d966baf80cb824e72682ef66bafc0c66b8000066eff26f66ba420066b8601366ef6467650f01c4b9800000c00f3235000800000f30c4e1fc29db", 0x55}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:54:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad092", 0x1f, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:08 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 553.733298][T18678] loop4: detected capacity change from 16383 to 0 [ 553.843068][T18678] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) [ 553.860805][ T2191] blk_update_request: I/O error, dev loop2, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 17:54:08 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 553.891018][T18678] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 553.971687][T18677] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 554.009118][T18678] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 554.059681][T18677] XFS (loop2): SB validate failed with error -5. [ 554.106637][T18678] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/461/file0 supports timestamps until 2038 (0x7fffffff) [ 554.163537][ T2041] blk_update_request: I/O error, dev loop2, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 17:54:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e1", 0x21, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) [ 554.229571][T18700] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 554.241821][T18700] XFS (loop2): SB validate failed with error -5. [ 554.480580][T18716] loop4: detected capacity change from 16383 to 0 [ 554.510300][ T2041] blk_update_request: I/O error, dev loop2, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 [ 554.552452][T18716] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) [ 554.601163][T18716] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 554.647942][T18716] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 554.650192][ T2041] block nbd0: Attempted send on invalid socket [ 554.664703][ T2041] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 554.677065][T18722] XFS (nbd0): SB validate failed with error -5. [ 554.687452][T18716] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/462/file0 supports timestamps until 2038 (0x7fffffff) 17:54:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:54:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000080)={[{@noikeep='noikeep'}]}) 17:54:10 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 17:54:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e1", 0x21, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:10 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = mq_open(&(0x7f000084dff0)='\t\x00\x00~', 0x0, 0x0, 0x0) mq_timedreceive(r1, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) 17:54:10 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) [ 556.264448][T18747] loop4: detected capacity change from 16383 to 0 17:54:11 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 17:54:11 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000100)={{0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 556.317479][ T2041] blk_update_request: I/O error, dev loop2, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 [ 556.332553][ T2041] block nbd0: Attempted send on invalid socket [ 556.336122][T18753] XFS: noikeep mount option is deprecated. [ 556.339094][ T2041] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 556.339431][T18746] XFS (nbd0): SB validate failed with error -5. [ 556.407729][T18747] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) [ 556.443171][T18747] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 556.458486][T18747] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 556.471462][T18747] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/463/file0 supports timestamps until 2038 (0x7fffffff) 17:54:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e1", 0x21, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) [ 556.529405][T18753] XFS (loop3): Invalid superblock magic number 17:54:11 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 17:54:11 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, 0x0) [ 556.621465][ T2041] blk_update_request: I/O error, dev loop2, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 17:54:11 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000003e80)=@req3={0x0, 0x0, 0x0, 0x1cb}, 0x1c) [ 556.722817][T18786] loop4: detected capacity change from 16383 to 0 [ 556.791564][T18786] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) [ 556.821769][T18786] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 556.836401][T18786] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 556.858946][T18786] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/464/file0 supports timestamps until 2038 (0x7fffffff) [ 557.259671][ T2191] block nbd0: Attempted send on invalid socket [ 557.266533][T18800] XFS (nbd0): SB validate failed with error -5. 17:54:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:54:13 executing program 5: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x3}) r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000140)={0x0, "dfc589f3330506b5b259adda7442a4cac641ad04853501a67831307020306b0bc767733af10b4d9c383afd224e10efa18f489879217f4ff900"}, 0x48, 0xffffffffffffffff) request_key(&(0x7f0000001300)='keyring\x00', &(0x7f0000001340)={'syz', 0x3}, 0x0, r0) 17:54:13 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x1) syz_read_part_table(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 17:54:13 executing program 2: r0 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x5e, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x0, 0x3}) 17:54:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f", 0x22, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:14 executing program 0: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 17:54:14 executing program 5: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x3}) r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000140)={0x0, "dfc589f3330506b5b259adda7442a4cac641ad04853501a67831307020306b0bc767733af10b4d9c383afd224e10efa18f489879217f4ff900"}, 0x48, 0xffffffffffffffff) request_key(&(0x7f0000001300)='keyring\x00', &(0x7f0000001340)={'syz', 0x3}, 0x0, r0) 17:54:14 executing program 0: r0 = socket(0x29, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$netrom(r0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$l2tp6(0xa, 0x2, 0x73) getpeername$l2tp6(r1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_QGROUP_CREATE(r2, 0x4010942a, &(0x7f0000000040)={0x1, 0x9}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='cachefiles_create\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) 17:54:14 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4800, 0x0) [ 559.351764][T18818] loop4: detected capacity change from 16383 to 0 [ 559.477473][T18818] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) [ 559.505646][T18814] print_req_error: 1 callbacks suppressed [ 559.505703][T18814] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 17:54:14 executing program 5: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x3}) r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000140)={0x0, "dfc589f3330506b5b259adda7442a4cac641ad04853501a67831307020306b0bc767733af10b4d9c383afd224e10efa18f489879217f4ff900"}, 0x48, 0xffffffffffffffff) request_key(&(0x7f0000001300)='keyring\x00', &(0x7f0000001340)={'syz', 0x3}, 0x0, r0) [ 559.604630][T18818] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) 17:54:14 executing program 5: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x3}) r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000140)={0x0, "dfc589f3330506b5b259adda7442a4cac641ad04853501a67831307020306b0bc767733af10b4d9c383afd224e10efa18f489879217f4ff900"}, 0x48, 0xffffffffffffffff) request_key(&(0x7f0000001300)='keyring\x00', &(0x7f0000001340)={'syz', 0x3}, 0x0, r0) [ 559.651173][T18814] XFS (loop3): SB validate failed with error -5. 17:54:14 executing program 2: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000080)) [ 559.704539][T18818] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 559.749616][T18818] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/465/file0 supports timestamps until 2038 (0x7fffffff) [ 559.862835][ T2191] blk_update_request: I/O error, dev loop3, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 [ 559.932109][ T2041] blk_update_request: I/O error, dev loop3, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 17:54:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:54:17 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 17:54:17 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x2) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000380)={0x0, 0x3, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '{[a='}, 0x0, 0x0, @fd}) 17:54:17 executing program 2: socketpair(0xa, 0x0, 0x7fffffff, 0x0) 17:54:17 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x1) syz_read_part_table(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 17:54:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f", 0x22, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:17 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x1) syz_read_part_table(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) [ 562.391776][T18872] loop4: detected capacity change from 16383 to 0 17:54:17 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000640)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000680)) socket(0x10, 0x0, 0x0) pipe(0x0) 17:54:17 executing program 0: r0 = mq_open(&(0x7f0000000300)='+\'\x00\xec\xe0\xcf\x1b\x84k\x84\xa9G}`\x12d\x81\x930\x14\xf1\xab\xc4\x04\x18\xfew\x16\x9d\xa0#\xd2\v\xe7\xc1?\xcd\x8fXE\x1e\x1a\x00\x1e\xdc\xdd\x99b?\xbb\xf4\x14\xa23\xaf\xe9\xc4\xbe\x18\x00G+g', 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="5ed05493853aaca6cce35fcb16a00d766077609fec8f653ec267413f109f01acd9909f4213359a2b329fa2527d196788a1213445b7804a17a8a4100ad238b5a95bec28af7a157205c46f78bdc0d2ea14ad3e669dbf04b56824d6ff092403601646a4dcdef7f755a11337cfedfe899dab610867f1761b89d50ab14d21ea47f4af7cf42ef4102bda877bee858d292342d2cd2db587279453128edb745f9eb1dac4796a7afad1d4f389a92f5402bcc3a1aa7ad9ba0200000000000000d5cf4c73b84411b8e27b119ce342a905b8272c8d18f07d64340fc4340faaa6cddc0d8c6f971324093f061000"/243, 0xf3}, {&(0x7f0000000740)="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", 0x200}], 0x1000000000000145) [ 562.474294][T18872] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) [ 562.568960][T18872] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 562.569073][T18874] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 562.673676][T18872] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 562.696328][T18874] XFS (loop3): SB validate failed with error -5. 17:54:17 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000080)={0x0, 0x2, 0x2, {0x2, @raw_data="b6ef0c9f13fa0ea7a5c51a33d60a712dc6845150406ca3d79bb63010d6c435488edc564e4049f2b15690d256e663050af1bae2497208468f1ef2107d71260fdf0c7bb0d7e728df7b66cd40eb3d99f2613390aaffce39f2504409519e5b07f3c9c3109f960e1a76e9ab20381650765b1f6f4a6056ecaf87a025c2d766c76f2151081dc6fdebe16ffb4b92aa2a5647cfc16fb6378f2b15e331bed008afe3176675b722f07c6ff1200eabbf4856e789f2c07b08b04f6b331965e5afefdcd704a3f08dbdd3535de6b8f0"}}) [ 562.710528][T18872] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/466/file0 supports timestamps until 2038 (0x7fffffff) 17:54:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f", 0x22, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) [ 562.790828][T18892] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 562.816123][T18892] XFS (loop5): SB validate failed with error -5. 17:54:17 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000000)) [ 562.903505][ T2041] blk_update_request: I/O error, dev loop3, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 [ 563.007307][ T2191] blk_update_request: I/O error, dev loop5, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 [ 563.056081][T18912] loop4: detected capacity change from 16383 to 0 [ 563.154408][T18912] EXT4-fs error (device loop4): ext4_orphan_get:1385: inode #17: comm syz-executor.4: iget: bogus i_mode (137000) [ 563.167091][T18912] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 563.198004][T18912] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 563.211495][T18912] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/467/file0 supports timestamps until 2038 (0x7fffffff) 17:54:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)={[{@nogrpid='nogrpid'}, {@noikeep='noikeep'}, {@norecovery='norecovery'}, {@gquota='gquota'}, {@largeio='largeio'}]}) 17:54:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:54:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x1) syz_read_part_table(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 17:54:20 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x1) syz_read_part_table(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 17:54:20 executing program 2: mq_open(&(0x7f0000001180)='z[\x9f\xfbg\xf5\x8d\xa5\x02B\xc4YhTn\xa54R\x03\x8d\xa8\xb8\xf5\xa6\xf29\xb5&%?\x9e\xac|\xde\xf7\xbfl\rL\xe6;\xbcWJ\x12\x90$\xd3\x83\xfd\xc2\xa0\xb1\x9a\x8e\xe3\\\x8d\xea0\x11\xe3\x9a\x06\xbbB\xf0\xd2\xca\x01', 0x0, 0x0, 0x0) 17:54:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) [ 565.527680][T18940] loop4: detected capacity change from 16383 to 0 17:54:20 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000000)=@random={'os2.', '\x00'}, 0x0, 0x0, 0x0) [ 565.644438][T18940] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -116) [ 565.672311][T18936] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 17:54:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) [ 565.683575][T18940] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 565.683687][T18940] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/468/file0 supports timestamps until 2038 (0x7fffffff) [ 565.719989][T18934] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 17:54:20 executing program 2: sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, 0x0, 0x4000040) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) [ 565.819540][T18934] XFS (loop5): SB validate failed with error -5. 17:54:20 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000140)={0x0, "dfc589f3330506b5b259adda7442a4cac641ad04853501a67831307020306b0bc767733af10b4d9c383afd224e10efa18f489879217f4ff900"}, 0x48, 0xffffffffffffffff) keyctl$link(0x8, r0, 0xfffffffffffffffc) 17:54:20 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x0, 0xc, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "dea2be0a"}, 0x0, 0x0, @planes=0x0}) [ 565.978468][T18936] XFS (loop3): SB validate failed with error -5. [ 565.997211][ T2041] blk_update_request: I/O error, dev loop5, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 17:54:20 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x1) syz_read_part_table(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) [ 566.069292][T18970] loop4: detected capacity change from 16383 to 0 17:54:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xa4}}, 0x0) r1 = epoll_create(0x7ff) dup3(r1, r0, 0x0) [ 566.162387][ T2041] blk_update_request: I/O error, dev loop3, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 [ 566.220040][T18970] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -116) [ 566.316412][T18970] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 566.394553][T18970] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/469/file0 supports timestamps until 2038 (0x7fffffff) [ 566.816078][T18993] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 566.836044][T18993] XFS (loop5): SB validate failed with error -5. [ 566.944060][ T2191] blk_update_request: I/O error, dev loop5, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 17:54:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:54:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x1) syz_read_part_table(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 17:54:23 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'netdevsim0\x00'}) 17:54:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)="504d4d00504d4dff", 0x8, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:23 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffef1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:54:23 executing program 5: socket(0x3, 0x0, 0x49f24244) 17:54:23 executing program 2: mq_unlink(&(0x7f0000000080)='\x97C_\x982<\xf3\x10\x7f\xe8b0\xaf\xe3\x10-t\xa7<\xa9[\xb9\x9b\xa9\x83\xb7#xQ\x13\xe1AN\a\x01\xee/$\xfb?\x93t\xe38\x91\xd55\xafg\x89\xaf+\xd1\xabU\xaa\x84\x94\xb4\xbb\x046=\x85T\xf7\x18\x1a\xd4bl\x00\xba\x88_\x9dc^Q~\xf8j|\x9f\xef\xc1O\x84_\x1a!\x93z\x94#\x925\xaal\x83\x8fy\xd5O\xb6\x1b\xb0\xc06n\xfe\xde\xe5\x04@{:\x8e\xc7\xa6\xa5\xb7E\xa4>l\x11\xa0\xb2\x8c\xa5(g\t\xc4\x00\xe8\x8by\xc2\x80\xee\xc6\x90\xad\x9c\x97\x06\a7-p\x87\xf4\"\xc4\xe3I\xec8\x8fB\xc1\xca\x16$\xe7\x16\xd8CH\xdb,~\x19p\x97\xa0\x1dW\x1f\xea\x100AO\xd3\xed\xc1\xea\xd8\xb2F\xa0D\xa4\xce\xc3\xf2&\xdf\xfakl\x12\xf9\xce\x14\xc1mh\x1d\a\xf2R\x9ei\xd4Q&K\x8f\\\b\x9f\xa3\xce\xde1\xf5s\xbc\xab\xc5\xc2\xe1\xd1\x7f\x18w\x02\xd3#x\x97\x8c\x85\x97\xd4\x12\xb4\xba\xef\xe2\x16_\xa0\x16\xd5*\xda\x1b\xe0\xc9\x18\xf9\xbb\xcc\xa89wN\ng(\xe4y\x18C\xa6\x9eJB\x1a\xc9\"\x83\xdf\xbd\x90\t\x17@\xccy\xb8:3\xc5=\xb8\xech\xfa\xd5\\[\xdcz-\xea\x83\xdd\x8d\x82Lb/\xc5\xd5$\xd5%\xa9\xbcy\xa9\xd5\x87fv\x94hI\x19i\"Nj\x9e\xe2o\x13\xef\xca5\xa9\xc2') [ 568.541455][T19011] loop4: detected capacity change from 16383 to 0 17:54:23 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000001040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000600)=ANY=[@ANYBLOB="076e8600d2d7390232a3f5d48a098ae4849caac639ecafadd6e024133937d2d359bd39b01f000000a0fe4a5d22168901af08db1333fc10cadf6809f064a39d08b6928ca9f2208ed8ed4d33f8bb480b5cf98269ecb2e4e7d2f0b8b093c1490121c7dec35868ff793d2e46e28320df276732878bc72a4fde32ac7946459c4a42c92c4a794235a4920e8395275454d572d5f24b2ba0021044d159500865a5a04ff00000000000000000000000000000f9ec4d0e6ccbccf1f8112e2748a8cf51082c8cb778", @ANYRES16=0x0, @ANYBLOB="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"], 0x398}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, 0x0) fsetxattr(r1, &(0x7f00000000c0)=@random={'osx.', '/dev/loop-control\x00'}, &(0x7f0000000100)='/dev/loop-control\x00', 0x12, 0x2) 17:54:23 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) [ 568.687171][T19038] rtc_cmos 00:00: Alarms can be up to one day in the future [ 568.697245][T19011] EXT4-fs error (device loop4): ext4_orphan_get:1390: comm syz-executor.4: couldn't read orphan inode 17 (err -116) [ 568.715872][T19011] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 568.723228][T19039] rtc_cmos 00:00: Alarms can be up to one day in the future 17:54:23 executing program 5: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, 0x0) [ 568.731908][T19011] ext4 filesystem being mounted at /root/syzkaller-testdir401040237/syzkaller.SzjAee/470/file0 supports timestamps until 2038 (0x7fffffff) [ 568.774992][T19015] XFS (loop3): Invalid superblock magic number 17:54:23 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)='s', 0x1}], 0x1) 17:54:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) [ 569.078151][T19060] loop4: detected capacity change from 16383 to 0 [ 569.096176][T19060] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 17:54:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:54:26 executing program 5: socket(0x0, 0x0, 0x4) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$vmci(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/vmci\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:54:26 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000001040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000600)=ANY=[@ANYBLOB="076e8600d2d7390232a3f5d48a098ae4849caac639ecafadd6e024133937d2d359bd39b01f000000a0fe4a5d22168901af08db1333fc10cadf6809f064a39d08b6928ca9f2208ed8ed4d33f8bb480b5cf98269ecb2e4e7d2f0b8b093c1490121c7dec35868ff793d2e46e28320df276732878bc72a4fde32ac7946459c4a42c92c4a794235a4920e8395275454d572d5f24b2ba0021044d159500865a5a04ff00000000000000000000000000000f9ec4d0e6ccbccf1f8112e2748a8cf51082c8cb778", @ANYRES16=0x0, @ANYBLOB="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"], 0x398}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, 0x0) fsetxattr(r1, &(0x7f00000000c0)=@random={'osx.', '/dev/loop-control\x00'}, &(0x7f0000000100)='/dev/loop-control\x00', 0x12, 0x2) 17:54:26 executing program 3: sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0xedf514df35655e9) 17:54:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)='s', 0x1}], 0x1) 17:54:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:26 executing program 3: sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={0x0, 0x398}, 0x1, 0x0, 0x0, 0x4000001}, 0x4000040) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@random={'osx.', '/dev/loop-control\x00'}, &(0x7f0000000100)='/dev/loop-control\x00', 0x12, 0x0) [ 571.621143][T19079] loop4: detected capacity change from 16383 to 0 17:54:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)='s', 0x1}], 0x1) 17:54:26 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000100)={{0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 571.762746][T19079] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 17:54:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:26 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000001040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000600)=ANY=[@ANYBLOB="076e8600d2d7390232a3f5d48a098ae4849caac639ecafadd6e024133937d2d359bd39b01f000000a0fe4a5d22168901af08db1333fc10cadf6809f064a39d08b6928ca9f2208ed8ed4d33f8bb480b5cf98269ecb2e4e7d2f0b8b093c1490121c7dec35868ff793d2e46e28320df276732878bc72a4fde32ac7946459c4a42c92c4a794235a4920e8395275454d572d5f24b2ba0021044d159500865a5a04ff00000000000000000000000000000f9ec4d0e6ccbccf1f8112e2748a8cf51082c8cb778", @ANYRES16=0x0, @ANYBLOB="000329bd7000ffdbdf2503000000580008801c00078008000500133d815c08000600cd0000000800050042d5f6182400078008000600b1000000080006009c00000008000500a75c6b7f080005001b72bd4c140007800800050038226663080006006000000008000200020000000800020003000000d400088014000780080005003fcd740908000500376e32071c000780080006009b00000008000600b6000000080005002481431e3c00078008000500581d635c08000600ee00000008000600af000000080006007a0000000800060087000000080006004c000000080005007c01be4b240007800800050061250b730800060034000000080005009c2d9114080005007688e53d0c000780080006004d0000001c000780080006005400000008000500113eb11c08000600c30000000c000780080006000d0000000c00078008000600e3000000f4000c8054000b8008000a00e1f8000008000900e69891240f000900a4168c5608000a0041ae0000080009004ff3393b08000a000cf8000008000a00dd8d000008000a0017d1000008000900d63ba52208000a00547900002c000b800800090046ec394c08000a00f9600000080009008b5f746f08000a000e0b0000080009003a29a7443c000b8008000900d2f7877108000a00f46e000008000900a3590d1108000a006d44000008000a00646c000008000a00b613000008000a004538000034000b8008000a0000a7000008000a00eda300000800090083cb9f0208000a001f5400000800090071e95d50080009007fc3337780000c8034000b800800090085c64b3b0800090036152a3208000900715fa42b08000a00fbeb000008000a009af0000008000a00639c000004000b800c00"], 0x398}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, 0x0) fsetxattr(r1, &(0x7f00000000c0)=@random={'osx.', '/dev/loop-control\x00'}, &(0x7f0000000100)='/dev/loop-control\x00', 0x12, 0x2) 17:54:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)='s', 0x1}], 0x1) [ 572.131991][T19122] loop4: detected capacity change from 16383 to 0 [ 572.166251][T19122] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 17:54:29 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f0000002240)) 17:54:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:54:29 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000040)={0x5, @raw_data="c0d7033fd043a7dc76d2eb7d05c3a5a2de30682ef4ed7c89aa17e333c9bea301334d5274656daecc26df5989726513634fd2cade6c63ce2d9f721c01e4a6fafc735db082210a6d5510ef6d4aa08cab9e381d1f72387f8b47996ec046f42837932fadaa5597b8301e691dbf826730312c5ac49ccadd2fecb170b49796b23cb52212f0cb329709e8cedcb1edb4dff3ec4b17ff771c0e29eda9deabf7a678836686f31f686792fed16f763b8b05e0d1e6d43d3118dff87ef9afa6be35aa69e38940b9a9dd8e1cba9378"}) 17:54:29 executing program 2: keyctl$join(0x1, 0x0) add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000140)={0x0, "dfc589f3330506b5b259adda7442a4cac641ad04853501a67831307020306b0bc767733af10b4d9c383afd224e10efa18f489879217f4ff900"}, 0x48, 0xffffffffffffffff) 17:54:29 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000001040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000600)=ANY=[@ANYBLOB="076e8600d2d7390232a3f5d48a098ae4849caac639ecafadd6e024133937d2d359bd39b01f000000a0fe4a5d22168901af08db1333fc10cadf6809f064a39d08b6928ca9f2208ed8ed4d33f8bb480b5cf98269ecb2e4e7d2f0b8b093c1490121c7dec35868ff793d2e46e28320df276732878bc72a4fde32ac7946459c4a42c92c4a794235a4920e8395275454d572d5f24b2ba0021044d159500865a5a04ff00000000000000000000000000000f9ec4d0e6ccbccf1f8112e2748a8cf51082c8cb778", @ANYRES16=0x0, @ANYBLOB="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"], 0x398}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, 0x0) fsetxattr(r1, &(0x7f00000000c0)=@random={'osx.', '/dev/loop-control\x00'}, &(0x7f0000000100)='/dev/loop-control\x00', 0x12, 0x2) 17:54:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0, 0x0, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:29 executing program 5: r0 = mq_open(&(0x7f0000000180)='^\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/145, 0x91}], 0x1, 0x0, 0x0) [ 574.694889][T19142] loop4: detected capacity change from 16383 to 0 [ 574.705672][T19142] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 17:54:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 17:54:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0, 0x0, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002340)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8030000, 0x0, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559"}, 0x28) 17:54:29 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/stat\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x1) [ 574.918924][T19163] loop4: detected capacity change from 16383 to 0 [ 574.946841][T19163] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 17:54:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 17:54:29 executing program 2: ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000040)=ANY=[@ANYRES64=r0]) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000000c0)={0x0, r0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000040)=ANY=[@ANYRES64]) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000000c0)={0x0, 0x0, "01acc2898eb82754888306174589b4acdc8c0275128f4e5c6eda10737dcbe938a644a518c3cb9cf930990e50a3e7c297a0e43890e4f3946ea99df579ab8a2d4ff67d92aa0f71c448c84996d6e90ad99f76c4e99a5e6347942071f6151d98ae1c9859ff52581b3d008fabd3ba74c71e172b697a3e3835710369569221932c05c12ac0e00291fafff75dce67b1951ef25bf247061e168853ee104de5b54e9f08c5321bf1faf053481420d8acf6db13f1d525b60cd3f7eca51f60a34d771535fe4a9622ff06a23db09108c9464c3e503c09f7adb765225b7ca7a220be50568692d31ad22ed0c40e285022b5ac20628b91113b6b1cff932f17b71cd95e85b88c9601", "3f522bd7de639475f4587fe23b171179869e966adba596356da6aba4730dc25c8208685766007814b0df8b9a5a1c03bfb4e3caef5dcefe493b04a926d8cc4b8207bd53a537c88938ca66f08e1d11287d914b815c2b212212c5fcf2304fb5ff0f67017100b14f894f8c40dd1847ad67f22f257ef073a92e3c35a27dc16ad1c9ded92563cb05deb43ce339614d0d552eaa94daa3311b8e5a2f891d131efd45b2c401e85af50a47294e2eb7a0c6dfdd07da0c19e359b1435824de336f9ffdf5acaf756d764bf7702d67844cfb09c431bc33a594c07f95376e5f2e844a39a9f447b711ad51a7f1a55d01137d1aac55df44af9b9c68691e5c480251988d4562ef2a9726cc94366922dc07d02f2825a13f6d1f0e8a3db815ed5707284f72f34fbbb40c40538a75b8c730b7b2bce86966b863f42d64bf3a748af3037f307cbe94aef6a6554cf283d782ffb0089efefb673bcbe8a8349edbe134266e4a4efb398fcad3b10c4973d6e5af2839574eb09f0ddcb87522f74fce6e8c5ffccd582a15be8c527fb5fac177210cb87fe01c6415624e095ac3cdb9d174a3d32de76e67b1448ae7d9b9069febf96424301894f6b294c12e4c226530ee157b3e3e6cc665bc5e39dd5a322856e4e95d161298a55286ca6770ebe8abde79b44e024efbb151bd338412bec5a094b8dc649e20f54c77a62cf1fb66cd9a013fb73e8a1250b385e0de70d13fa0eee47c8af7093ede6589636a18fbfd8e1272b3970c6f541d052e72bbc43f74c14c3bcfc1df34a445798b7bebfc721a2f9cd03217d886800e384fbc8338e733b93b8d105d2a3713650bc18dfa00caf63a8463aa9fb0e18569943500056ca40b3ad40c7c3f75aa1ac7c9303651a0445a50a2b34e7b7be595df03f224accf393a7d8b4eb6cee6a010db59f28432c24b07637fea1e461f55f3838a423ce1add011171673f19afedb9e94d7fc85c26c0779253b63cb0d1b77e92c0bc4466894d1954e9465e23e9fcbcb7f49dead69c62b0c7fb118ca8d18994cb41567bc58934649104b76e457698ae6885cfe5e12622ea79969d1af463693283d086a74ebdeb5fc4f288f0b87e18cb9caf07965bde54bde58834896bfe21be8724d04875817c8716b045e6924c574f4a0190ef2a478f8e50981cbd1062f3f632990b2357032b384c88043c1d775da9afe28e5a59bc7e782d021a5ac6ca62d89acf350247d2497f1c2cebbcccd7cb8b1b491bad640738bb396788c216a967cd36a39bd7ff106ad84aedb186c16ab339752c86c58dd0fc4669f3dc6c340c2ea2040571787332968a0535502c2a146d05d928285aa77ad957946b6f25426c16d26ec8f118c4f961e14c29811487a3655cf37ddaad223200af38c9e62d46e9d9b9923a95f9d39bc45e00740293ad645977a68192ac90b61ed0917c91deb872b967254ef0e42e8fa3ce8ad3855cb146a66acbd34bbff35192bd8628017a587c51ff98030acd89e9a3f7e06af6831f3d6f4b48dc5d4ceefc802b01c497e13b726146fa5f1d64277b636be859d3aa835a54f34b0a036de266c99811ec9c0fbff62882a4d8308c3166d068871b49e2fa375e40bee3656bb3c79212503348253d93dd0d6b7e303769b80e74cffd1484d009f3bc24cf5b5a87b6421dc217e0d2f459c2c41d0a184f090c4437da12c4d23ee78d6502b02e51187fe1fa325b600a27383cb39f2c8828b171cb9d04e523331c9d0dc34f01cc6632c93f06eb776e78dc45fcb35d2290156a25c5a887edb5531ba0fad77f2152e915f84c3a860f25f70592c391a04ab550c77dc7305208abbb7ea63c92b4a5174d0aef0736124100363e68b5493b7827b239407af7a6dc862554452909e425fde159ec9a7bf301f79f64a8d23a9caf5822c62361212fb932dd57c420d9ccca450e8a4a65dd027574c81dec9cd8d3d1b1522bddb68e8a9aed547dc8c1c521ac7e8c6a9614b5f0cba4a5e11bf5d5758f2bdafd204ea8d2a619ea6184d3271efc6d6a7ee9365f0cecba24e7d3f026453ff2b26db2fe8ea5d653fe5a520372a6ab54620b87847139e47d9b9c91b0182447c2662351eefe172e183ce1e2b3480caac9ec3ffa2cf4f49db739dc846a4466ead9bb76ad9189f4acfe3fd38f7f71efd3f82de6666c2fac5449f96f4a530eecf0a9d61bac82516fe63b500b62a8acc9d8a55cdba0c56b9bc12dee178578ab5ba5bddc466cd0536fa36597e993c5b8b7062549e439efa3b19cf9cd1f3e0ebb448a2fd17d1e4a9afff595a503ce1078bc2f4bf8d8d504029dc197fb50013b4628cdae638e2e08e0b087d2260ec45758bc2f81a4b3be9b4cb69c1535c0dfc859c83c79f8660e9e0520f74ec3d350673eb1c2cc1ad78d4b407d6a97556cd2dbdd862c6084d5e2451eb8e0973d8f3cd74b30589dd519274b006b31d613f472d4a84ae72795c8dbf00b8c73d777c2fae26efb89a3762db5744f316f4345c0bef02ec63ce223a43e6efcf219128743d0309f03c2456171c8bb63a1e57ff289a6439c7c0812f13a3a9e3642712688d0ecaf55cf0b41b245fda6c4acdff05288381637c941f166de974dda40bef43a8b2548c7ad180bf0a58573cbcade1c31dde65712db571b9f6fa9e2679176e0156e0a057deca76335d9c948d0aa15ec9b37c75fc0c371801366a015560b497d06918ca3efeb401aa95295642b31c0ce009ec40d92d0d3d1bae52ea632193cb1797af9e9bc8fc61dc3d5008a81072886a36ca58b03de19e5823e38ae7b09b047ff198dbca897cb2afadf4bcf47843db8a52a1c15bb1ce1bab9b2dfb5d5ab489643dcb647f654b973923bed91e0c72129b893b8c067fe2764a0a67c6e56f54b59b4daa3d60f2b2397611cda9d7be9ac4dfa6b440675cef674a31460475139f5e3ca448d28fa47d06a1e78beabd82ab00cc32a90f4d39d8161751424fbbde2b51cd2454b8022e2933e2150fb9c3267f7f8d0bef569afa286d382ae471f7868b90dffb15d5836f6d37501f5cbd98ebbeb604f6fc118e27e867d8ee26c1ab8b6d575f80de064199978de5bc43c1ba1172927949c1a27ff95a91c611622e8c3de9758b794547cb499061dc5e4d4d267df12f9c0a779b52e36af978ae21fab7a86accd9a617d2e47332a02ce67423b4c4c91ab980054c3d576463eb928e83c7fdf5653b7698174c1da9e966e784e1c6c61c08e6713a5101022ceb1e9a0d9e2c2e815e4fd18faf7823aba424c2df1ccebb18ca0b687a6716c3b8bb87d4351e9466c70e9cd37328f36de6cdb8dca5f70b2930009d84d293563d17f6632fa78ca385bf227dfbe0d0ff06d41079f3a98642d2d35fadd81456a565fc4c6d26fcff88e5b7a8f4ca0ff947d71f7e8554b69aab15dd8bb97a604f9d43f09d4af3c94021c0fe264413c1f16d7fdc048b37c8920c788b727fe3024283d6b9adfacf302066c601b63b2b9e4d1d5079199c1e699eeb391eac9369deb77581bb4957d7fd73c73eebf2867dabcf7a1c5a9d561543af0459063480551c14df1b8b34d697e7c983685c9a84d14a434af2580ff814e8d136e30ad66f28b77144595bc598b9d2e8025a92339f960fd619fd6409286ea2b6af9eb6eb941a2940ec59c204c7074dc7cd69c097bba44345f0927668687b902a97d74152613e94cfdac2889269e6d70352c0b3953e69e852f9a2d5501a2208c59916975bacb888e74fe17c1f1be1b98ef597886ead58167449579f735d3acfd3be23aa974fa80a7756373e69b0cb592cae4b731a30024ceff31b4a9285d6de86c2cdc0cb58ee220e2b4696f356cd87847137c95897d49c0470ac099cc20a88f446e6468ec12a81394846beb2438090602576cafea8a83f6226e2b90c68b494965e85f5f0e9828f3af76283328c7dd7ef3b71b066b45e5c5ead76a871f01958a2dbf6fbd5e44574c93da4841f205b43740e1f59954fb57083bad4bb3723e507f965f3892e3d173162ba83f7ddb84a69595e196b8f92aced0db31ff9eeea3b2b018b97847918c1f1819c55f561faf7fe57288d3d7dc9f955e1ec83abef7aedc79ec96ec8990679baea55268df3ea27c035f31a74e72c3c67010afa85a0e1fafd874a0e6194d728bf2c3801122747935964398631476ac3d1fde43c04f74655c36555de4c119e0296a32d0a11aec12c63810c81f03dc739be2214ff570fe7ff54c95745977731ab2b416a6df977c2be0911d9fd8f3a58d124c81067c54307f91a3b750202837808f8dca6177f03ff32f4b6565dac3903aa74fcb9d3660f6a550fe368c6e43049b6a0df346623a2402039bf68ddac36008393911ab7be203e89f92eae2dccecff2e6ce504761e120e2158ce3750e610ace9e7ac7e14214ef2fcf96db3654dece5aec0cc293f53d086d105af6ae831084b62043c73f564ee76e3c8353b3263aca5816a9a3a474844a94cd5caf85ba1682f164fd3e7b930b6628cdd6fd4aa060902557c545accfe4da82fc2caf10aa61d381b6db0bfae6a7ba2d8bef03c7bd89285fe92abbf6dcf6edd1e58152508738b7a87549046035a2cd0caf1fc97a3dc9cf650200d04911e72f0a08e4a60dfb444cf4720749809e056b19292c8348495dee262487aff4ed1750f6025c987e91d3286c5f8ebf7f0a904dadeb9b6841728052726b99f434fc7bcdcf1d9811b321e7b04e5bb118c3e02e6acc91480a5ae6b6e6182bcdbd8d86902a0ceea1fa5782b74953e9093c7bd8287c7a3b7b7532c41cf933b23df0e0246adcbcaeb34df63cb014b410d6d43d1b043eadf73e1a565bd164ec02b42e0f7148549b958d65495c8b2611504256ff57f6c29b0453bbe828adf8061780956df96e801cbe63c893f3a98b6f063307354bbe989d4314d617584bede299c0905b5106472a130e67d7af8a28cdbdf7e2e6b5d495ba5bc2284eea27a043471a9b6d4f745539100e5160c8b09d85e512b088932006dee28d859c2738b6c8f745876ab3127ea0af7cc4e65cbffa1b3602db7044617cad2c67ba7d3fabc341c6826f5099e6b303d5fc5387555ef3fe648cd9f9a5faebc31bb31c6b2a950273027257e85b5c5a5b6daee7e34e8c33f854bcd429d1c70fcbb0a6022a7fca47d8e1a36aa47c182b9bc590d140066447a0738dcb27511b102dbae53fbc49415b8ec2042d46774f164239edcbe529bbe99e15246f99f17520e42e706032082c7e1cefa099c8d088d8d827e7c8ca49337c8680df71d772d89e5fb3999a1d62c204776bd8c6fc62441bb8f839b35937ed020e36510ff69a386483ad66b19e0279d23f6751ac677af0695316fb57d2557d19153075962e78a59d13101d4901c168e5f55b2acf707d7db302fb819e3ffdfaca6da3f3407e027d300a8fb334727f850fe345f209a8772233523e8eb841b5e744389acae2950356f362239f76915"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000052b40)={0x100000000, [], 0x10, "1a041314e1cdc8"}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) unshare(0x48000400) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) close(r3) [ 575.176477][T19181] IPVS: ftp: loaded support on port[0] = 21 [ 575.281371][T19208] IPVS: ftp: loaded support on port[0] = 21 17:54:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:54:32 executing program 3: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000000)={[{@noalign='noalign'}]}) 17:54:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0, 0x0, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:32 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000140)={0x0, "dfc589f3330506b5b259adda7442a4cac641ad04853501a67831307020306b0bc767733af10b4d9c383afd224e10efa18f489879217f4ff900"}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000140)={0x0, "dfc589f3330506b5b259adda7442a4cac641ad04853501a67831307020306b0bc767733af10b4d9c383afd224e10efa18f489879217f4ff900"}, 0x48, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 17:54:32 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000001040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000600)=ANY=[@ANYBLOB="076e8600d2d7390232a3f5d48a098ae4849caac639ecafadd6e024133937d2d359bd39b01f000000a0fe4a5d22168901af08db1333fc10cadf6809f064a39d08b6928ca9f2208ed8ed4d33f8bb480b5cf98269ecb2e4e7d2f0b8b093c1490121c7dec35868ff793d2e46e28320df276732878bc72a4fde32ac7946459c4a42c92c4a794235a4920e8395275454d572d5f24b2ba0021044d159500865a5a04ff00000000000000000000000000000f9ec4d0e6ccbccf1f8112e2748a8cf51082c8cb778", @ANYRES16=0x0, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, 0x0) 17:54:32 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x1) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000940), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 577.793502][T19240] loop4: detected capacity change from 16383 to 0 17:54:32 executing program 5: r0 = epoll_create(0x2e) preadv(r0, 0x0, 0x0, 0x0, 0x0) [ 577.889072][T19241] XFS (loop3): Invalid superblock magic number [ 577.923526][T19240] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 17:54:32 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) dup(0xffffffffffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x1) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 17:54:32 executing program 2: clock_gettime(0x0, &(0x7f0000000100)={0x0}) select(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={r0}) 17:54:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0), 0x0, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:32 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f0000002240)="89e5") 17:54:32 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) dup(0xffffffffffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x1) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) [ 578.215180][T19241] XFS (loop3): Invalid superblock magic number [ 578.295616][T19289] loop4: detected capacity change from 16383 to 0 [ 578.367778][T19289] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 17:54:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:54:35 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) 17:54:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0), 0x0, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:35 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000001040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000300)) 17:54:35 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000280010002407e0004f801", 0x17}, {0x0, 0x0, 0x5fc}], 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:54:35 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) dup(0xffffffffffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x1) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 17:54:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "520ec119922c47a6e138397db1983f4b"}) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 17:54:35 executing program 5: add_key(&(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) [ 580.822651][T19314] loop4: detected capacity change from 16383 to 0 [ 580.873398][T19317] loop2: detected capacity change from 5 to 0 [ 580.885572][T19314] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 [ 580.905402][T19317] FAT-fs (loop2): Directory bread(block 5) failed [ 580.912620][T19317] FAT-fs (loop2): Directory bread(block 6) failed 17:54:35 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) dup(0xffffffffffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x1) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x4) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) [ 580.926475][T19317] FAT-fs (loop2): Directory bread(block 7) failed [ 580.935438][T19317] FAT-fs (loop2): Directory bread(block 8) failed [ 580.942955][T19317] FAT-fs (loop2): Directory bread(block 9) failed [ 580.960228][T19317] FAT-fs (loop2): Directory bread(block 10) failed [ 580.968370][T19317] FAT-fs (loop2): Directory bread(block 11) failed [ 580.975075][T19317] FAT-fs (loop2): Directory bread(block 12) failed [ 580.984346][T19317] FAT-fs (loop2): Directory bread(block 13) failed [ 580.991764][T19317] FAT-fs (loop2): Directory bread(block 14) failed 17:54:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0), 0x0, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:35 executing program 5: perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:54:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, 0x8, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 581.223409][T19342] loop4: detected capacity change from 16383 to 0 [ 581.254944][T19342] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 17:54:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:54:38 executing program 0: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x5}, &(0x7f00000002c0)) 17:54:38 executing program 3: clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x5}, 0x0, &(0x7f0000000280)={0x0, r0+60000000}, 0x0) 17:54:38 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000280010002407e0004f801", 0x17}, {0x0, 0x0, 0x5fc}], 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:54:38 executing program 5: socketpair(0x1f, 0xa, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$getown(r0, 0x9) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="a40000000a06030000001000078040ac1414bb100007800a001100aaaaaaaaaa0b00000c00078008000b4000000be60c00078005001500940000002c0008801c0007801800168014000240fc0100000000000000000000000000000c0007800500070000000000140007800800064000000008050007005e0000000900050000007a310000000008000940000000060000000000000010000000000000"], 0xa4}, 0x1, 0x0, 0x0, 0x40080d4}, 0x4804) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r1, 0xc01064bd, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000200)={0x3, 0xeb, "fea8056b2408974af0ed0e6e7cb97ae17b7c24160766140c8e37e1ec3eb780e26daf531fbb83461a4f9c1d5ddfa9107feaabe09483ea85ba296edab4dad9e1303e090dbb655f68a18a85e0a8e1a0fc79957bb0c4051a45447671c7b3275dd171febba8071d8a8b25b9da1ee568b7ff3665acbfd705ae49576d517a376076e7d9467f457c88013dedc90aa1e6d14349a993fd9a9ef93f9f7e03deaa48171e3a3c6ebf146b9c603e9f6cd7d199cca549a12e4676385c3d2826507fb961f8a54053f853c97043ff6114ef4cf04c7ebaa5268106059c927cbc182211b375baa12d6f1f73df7e87ad7d82639372"}) ioctl$FIONCLEX(r1, 0x5450) 17:54:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)='PMM\x00', 0x4, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) [ 583.921930][T19362] netlink: 144 bytes leftover after parsing attributes in process `syz-executor.5'. [ 583.931687][T19360] loop2: detected capacity change from 5 to 0 [ 583.948810][T19363] loop4: detected capacity change from 16383 to 0 [ 583.968714][T19360] FAT-fs (loop2): Directory bread(block 5) failed 17:54:38 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000200)) [ 584.000559][T19362] netlink: 144 bytes leftover after parsing attributes in process `syz-executor.5'. [ 584.006355][T19360] FAT-fs (loop2): Directory bread(block 6) failed [ 584.016774][T19360] FAT-fs (loop2): Directory bread(block 7) failed [ 584.023803][T19360] FAT-fs (loop2): Directory bread(block 8) failed [ 584.030519][T19360] FAT-fs (loop2): Directory bread(block 9) failed [ 584.037175][T19360] FAT-fs (loop2): Directory bread(block 10) failed [ 584.044068][T19360] FAT-fs (loop2): Directory bread(block 11) failed [ 584.051073][T19360] FAT-fs (loop2): Directory bread(block 12) failed [ 584.070340][T19360] FAT-fs (loop2): Directory bread(block 13) failed [ 584.084554][T19360] FAT-fs (loop2): Directory bread(block 14) failed 17:54:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 17:54:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f00000000c0)={0x1, 0x0, [{0x1}]}) 17:54:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) 17:54:39 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, &(0x7f0000000040)) 17:54:39 executing program 5: ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$unix(0x1, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x8) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) getuid() socket$inet6_udplite(0xa, 0x2, 0x88) mount$overlay(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='overlay\x00', 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000380)={0x1, 'vlan0\x00'}) [ 584.491648][T19401] overlayfs: missing 'lowerdir' [ 584.742213][T19363] EXT4-fs warning (device loop4): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 584.742213][T19363] [ 585.522125][T19417] overlayfs: missing 'lowerdir' [ 586.080238][ T165] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 586.259486][ T165] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 586.413264][ T165] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 586.575115][ T165] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 17:54:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:54:41 executing program 3: openat$dlm_control(0xffffffffffffff9c, 0x0, 0x630c00, 0x0) 17:54:41 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000280010002407e0004f801", 0x17}, {0x0, 0x0, 0x5fc}], 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:54:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)='PMM\x00', 0x4, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000003c0)=[{&(0x7f00000001c0)="cc530d26ab8cffb4dfed170bb27d679988b5bacf82af7776064fbda702cc3798bafe7bf94ce74d982a5ac31e007035fb6f", 0x31, 0x81}, {0x0, 0x0, 0xfffffffffffff5af}], 0x0, &(0x7f0000000080)) 17:54:41 executing program 5: ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$unix(0x1, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x8) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) getuid() socket$inet6_udplite(0xa, 0x2, 0x88) mount$overlay(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='overlay\x00', 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000380)={0x1, 'vlan0\x00'}) 17:54:41 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000340)={0x0, 0x0, 0x4, {0x1, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) [ 587.087720][T19465] loop4: detected capacity change from 16383 to 0 [ 587.171376][T19474] loop2: detected capacity change from 5 to 0 17:54:42 executing program 3: syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) syz_open_dev$binderN(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x0) 17:54:42 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x1}, 0x6) 17:54:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r2, &(0x7f0000000100)=""/75, 0x4b) 17:54:42 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000280010002407e0004f801", 0x17}, {0x0, 0x0, 0x5fc}], 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:54:42 executing program 3: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SUBDIVIDE(r0, 0xc0045009, &(0x7f0000000040)=0x80) [ 587.873710][T19465] EXT4-fs warning (device loop4): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 587.873710][T19465] [ 587.997988][T19498] loop2: detected capacity change from 5 to 0 [ 588.045783][T19498] FAT-fs (loop2): Directory bread(block 5) failed [ 588.093644][T19498] FAT-fs (loop2): Directory bread(block 6) failed [ 588.157141][T19498] FAT-fs (loop2): Directory bread(block 7) failed [ 588.201349][T19498] FAT-fs (loop2): Directory bread(block 8) failed [ 588.250863][T19498] FAT-fs (loop2): Directory bread(block 9) failed [ 588.304864][T19498] FAT-fs (loop2): Directory bread(block 10) failed [ 588.343983][T19498] FAT-fs (loop2): Directory bread(block 11) failed [ 588.364161][T19498] FAT-fs (loop2): Directory bread(block 12) failed [ 588.386319][T19498] FAT-fs (loop2): Directory bread(block 13) failed [ 588.408115][T19498] FAT-fs (loop2): Directory bread(block 14) failed 17:54:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum, @restrict, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0xc6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:54:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x37) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000900)=@newqdisc={0x888, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x1, 'tbf\x00'}, {0x85c, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x40, 0x0, 0x8, 0x9, 0x3, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x7, 0x8}}, @TCA_TBF_RTAB={0x404, 0x2, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80000000, 0x2, 0x0, 0x0, 0x0, 0x71d, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x0, 0x0, 0x244, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x44, 0x0, 0x0, 0x0, 0x0, 0x8}, {0xf9, 0x0, 0x0, 0x0, 0x0, 0x3}}}, @TCA_TBF_PTAB={0x404}]}}]}, 0x888}}, 0x0) 17:54:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000380)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000540)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77f33a494dea43387ace4e871affffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff4f31ffffffffffffffffffffffffffffffffffffffffffffffff0600000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd966cf80cf0d", 0x403, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000000c0)='PMM\x00', 0x4, 0x10000}, {&(0x7f0000000140)="bef732929aa97484f5a00d0d6148c066b6c8ba742c36cf85f1fd322c0ad09253e10f7f", 0x23, 0x1c01}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000500)) 17:54:44 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SUBDIVIDE(r0, 0xc0045009, &(0x7f0000000040)=0x2) 17:54:44 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) mq_notify(r0, 0x0) [ 590.151979][T19520] loop4: detected capacity change from 16383 to 0 [ 590.280071][T19518] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 590.311331][T19528] ================================================================================ [ 590.322879][T19528] UBSAN: shift-out-of-bounds in net/sched/sch_api.c:389:22 [ 590.330931][T19528] shift exponent 68 is too large for 32-bit type 'int' [ 590.338210][T19528] CPU: 0 PID: 19528 Comm: syz-executor.0 Not tainted 5.11.0-rc4-syzkaller #0 [ 590.346979][T19528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.357053][T19528] Call Trace: [ 590.360356][T19528] dump_stack+0x183/0x22e [ 590.364835][T19528] ? log_buf_vmcoreinfo_setup+0x45d/0x45d [ 590.370625][T19528] ? show_regs_print_info+0x12/0x12 [ 590.375830][T19528] ? qdisc_get_rtab+0x1f4/0x410 [ 590.380815][T19528] __ubsan_handle_shift_out_of_bounds+0x432/0x4d0 [ 590.387270][T19528] ? qdisc_get_rtab+0x1f4/0x410 [ 590.392152][T19528] __detect_linklayer+0x2a9/0x330 [ 590.397194][T19528] qdisc_get_rtab+0x2b5/0x410 [ 590.401878][T19528] tbf_change+0x1bd/0x1c20 [ 590.406349][T19528] ? tbf_destroy+0x310/0x310 [ 590.410939][T19528] ? lockdep_hardirqs_on_prepare+0x3e2/0x750 [ 590.416961][T19528] ? tbf_init+0x63/0xc0 [ 590.421115][T19528] ? print_irqtrace_events+0x220/0x220 [ 590.426574][T19528] ? ktime_get+0x166/0x2e0 [ 590.431049][T19528] ? lockdep_hardirqs_on+0x8d/0x130 [ 590.436305][T19528] ? memset+0x1f/0x40 [ 590.440369][T19528] ? __hrtimer_init+0x173/0x250 [ 590.445209][T19528] ? tbf_init+0x63/0xc0 [ 590.449363][T19528] ? qdisc_peek_dequeued+0x220/0x220 [ 590.454650][T19528] qdisc_create+0x801/0x1470 [ 590.459234][T19528] ? qdisc_notify+0x370/0x370 [ 590.463902][T19528] tc_modify_qdisc+0xacd/0x1fc0 [ 590.468760][T19528] ? rcu_lock_release+0x20/0x20 [ 590.473607][T19528] ? rtnetlink_rcv_msg+0xad6/0xe60 [ 590.478792][T19528] ? mutex_lock_io_nested+0x60/0x60 [ 590.483988][T19528] ? rcu_lock_release+0x20/0x20 [ 590.488829][T19528] rtnetlink_rcv_msg+0xb1d/0xe60 [ 590.493783][T19528] ? rtnetlink_bind+0x80/0x80 [ 590.498464][T19528] ? lockdep_hardirqs_on_prepare+0x3e2/0x750 [ 590.504579][T19528] ? rcu_preempt_deferred_qs_irqrestore+0x68f/0x950 [ 590.511221][T19528] ? print_irqtrace_events+0x220/0x220 [ 590.516695][T19528] ? _raw_spin_unlock_irqrestore+0x2e/0x60 [ 590.522532][T19528] ? lockdep_hardirqs_on+0x8d/0x130 [ 590.527736][T19528] ? rcu_read_lock_sched_held+0x87/0x110 [ 590.533405][T19528] ? __bpf_trace_rcu_utilization+0x10/0x10 [ 590.539209][T19528] ? lockdep_hardirqs_off+0x69/0xf0 [ 590.544395][T19528] ? __rcu_read_unlock+0x46e/0x590 [ 590.549505][T19528] netlink_rcv_skb+0x1f0/0x460 [ 590.554309][T19528] ? rtnetlink_bind+0x80/0x80 [ 590.559008][T19528] ? netlink_ack+0xb90/0xb90 [ 590.563614][T19528] netlink_unicast+0x7de/0x9b0 [ 590.568384][T19528] ? netlink_detachskb+0xa0/0xa0 [ 590.573312][T19528] ? _copy_from_iter_full+0x2f7/0xa40 [ 590.578707][T19528] ? __phys_addr_symbol+0x2b/0x70 [ 590.583758][T19528] ? __check_object_size+0x2f3/0x3f0 [ 590.589052][T19528] ? bpf_lsm_netlink_send+0x5/0x10 [ 590.594232][T19528] netlink_sendmsg+0xaa6/0xe90 [ 590.598994][T19528] ? netlink_getsockopt+0xa50/0xa50 [ 590.604189][T19528] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 590.609467][T19528] ? security_socket_sendmsg+0x9d/0xb0 [ 590.614993][T19528] ? netlink_getsockopt+0xa50/0xa50 [ 590.620192][T19528] ____sys_sendmsg+0x5a2/0x900 [ 590.624984][T19528] ? iovec_from_user+0x359/0x390 [ 590.629944][T19528] ? __sys_sendmsg_sock+0xb0/0xb0 [ 590.635027][T19528] __sys_sendmsg+0x319/0x400 [ 590.639601][T19528] ? ____sys_sendmsg+0x900/0x900 [ 590.644522][T19528] ? __might_fault+0xb8/0x110 [ 590.649210][T19528] ? __lock_acquire+0x5e40/0x5e40 [ 590.654253][T19528] ? set_normalized_timespec64+0x118/0x1e0 [ 590.660060][T19528] ? ns_to_timespec64+0xa0/0xa0 [ 590.664899][T19528] ? __might_fault+0xb4/0x110 [ 590.669586][T19528] ? lockdep_hardirqs_on_prepare+0x3e2/0x750 [ 590.675564][T19528] ? syscall_enter_from_user_mode+0x24/0x190 [ 590.681526][T19528] ? syscall_enter_from_user_mode+0x24/0x190 [ 590.687497][T19528] do_syscall_64+0x2d/0x70 [ 590.691957][T19528] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 590.697857][T19528] RIP: 0033:0x45e219 [ 590.701748][T19528] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 590.721339][T19528] RSP: 002b:00007ffaae422c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 590.729791][T19528] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 590.737764][T19528] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 590.745855][T19528] RBP: 000000000119c068 R08: 0000000000000000 R09: 0000000000000000 [ 590.753809][T19528] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119c034 [ 590.761768][T19528] R13: 00007ffd189291ff R14: 00007ffaae4239c0 R15: 000000000119c034 [ 590.794809][T19528] ================================================================================ [ 590.806776][T19528] Kernel panic - not syncing: panic_on_warn set ... [ 590.813375][T19528] CPU: 0 PID: 19528 Comm: syz-executor.0 Not tainted 5.11.0-rc4-syzkaller #0 [ 590.822146][T19528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.832209][T19528] Call Trace: [ 590.835495][T19528] dump_stack+0x183/0x22e [ 590.839852][T19528] ? log_buf_vmcoreinfo_setup+0x45d/0x45d [ 590.845582][T19528] ? show_regs_print_info+0x12/0x12 [ 590.850799][T19528] panic+0x2e1/0x850 [ 590.854773][T19528] ? __ubsan_handle_shift_out_of_bounds+0x455/0x4d0 [ 590.861367][T19528] ? nmi_panic+0x90/0x90 [ 590.865620][T19528] ? log_buf_vmcoreinfo_setup+0x45d/0x45d [ 590.871364][T19528] ? qdisc_get_rtab+0x1f4/0x410 [ 590.876233][T19528] __ubsan_handle_shift_out_of_bounds+0x4cc/0x4d0 [ 590.882663][T19528] ? qdisc_get_rtab+0x1f4/0x410 [ 590.887528][T19528] __detect_linklayer+0x2a9/0x330 [ 590.892567][T19528] qdisc_get_rtab+0x2b5/0x410 [ 590.897266][T19528] tbf_change+0x1bd/0x1c20 [ 590.901711][T19528] ? tbf_destroy+0x310/0x310 [ 590.906306][T19528] ? lockdep_hardirqs_on_prepare+0x3e2/0x750 [ 590.912291][T19528] ? tbf_init+0x63/0xc0 [ 590.916454][T19528] ? print_irqtrace_events+0x220/0x220 [ 590.921944][T19528] ? ktime_get+0x166/0x2e0 [ 590.926371][T19528] ? lockdep_hardirqs_on+0x8d/0x130 [ 590.931605][T19528] ? memset+0x1f/0x40 [ 590.935598][T19528] ? __hrtimer_init+0x173/0x250 [ 590.940463][T19528] ? tbf_init+0x63/0xc0 [ 590.944628][T19528] ? qdisc_peek_dequeued+0x220/0x220 [ 590.949926][T19528] qdisc_create+0x801/0x1470 [ 590.954552][T19528] ? qdisc_notify+0x370/0x370 [ 590.959253][T19528] tc_modify_qdisc+0xacd/0x1fc0 [ 590.964132][T19528] ? rcu_lock_release+0x20/0x20 [ 590.968982][T19528] ? rtnetlink_rcv_msg+0xad6/0xe60 [ 590.974242][T19528] ? mutex_lock_io_nested+0x60/0x60 [ 590.979447][T19528] ? rcu_lock_release+0x20/0x20 [ 590.984355][T19528] rtnetlink_rcv_msg+0xb1d/0xe60 [ 590.989296][T19528] ? rtnetlink_bind+0x80/0x80 [ 590.993994][T19528] ? lockdep_hardirqs_on_prepare+0x3e2/0x750 [ 590.999963][T19528] ? rcu_preempt_deferred_qs_irqrestore+0x68f/0x950 [ 591.006557][T19528] ? print_irqtrace_events+0x220/0x220 [ 591.012020][T19528] ? _raw_spin_unlock_irqrestore+0x2e/0x60 [ 591.017819][T19528] ? lockdep_hardirqs_on+0x8d/0x130 [ 591.023024][T19528] ? rcu_read_lock_sched_held+0x87/0x110 [ 591.028642][T19528] ? __bpf_trace_rcu_utilization+0x10/0x10 [ 591.034438][T19528] ? lockdep_hardirqs_off+0x69/0xf0 [ 591.039627][T19528] ? __rcu_read_unlock+0x46e/0x590 [ 591.044749][T19528] netlink_rcv_skb+0x1f0/0x460 [ 591.049500][T19528] ? rtnetlink_bind+0x80/0x80 [ 591.054160][T19528] ? netlink_ack+0xb90/0xb90 [ 591.058760][T19528] netlink_unicast+0x7de/0x9b0 [ 591.063530][T19528] ? netlink_detachskb+0xa0/0xa0 [ 591.068454][T19528] ? _copy_from_iter_full+0x2f7/0xa40 [ 591.073866][T19528] ? __phys_addr_symbol+0x2b/0x70 [ 591.078879][T19528] ? __check_object_size+0x2f3/0x3f0 [ 591.084159][T19528] ? bpf_lsm_netlink_send+0x5/0x10 [ 591.089264][T19528] netlink_sendmsg+0xaa6/0xe90 [ 591.094062][T19528] ? netlink_getsockopt+0xa50/0xa50 [ 591.099364][T19528] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 591.104656][T19528] ? security_socket_sendmsg+0x9d/0xb0 [ 591.110122][T19528] ? netlink_getsockopt+0xa50/0xa50 [ 591.136256][T19528] ____sys_sendmsg+0x5a2/0x900 [ 591.141064][T19528] ? iovec_from_user+0x359/0x390 [ 591.146030][T19528] ? __sys_sendmsg_sock+0xb0/0xb0 [ 591.151080][T19528] __sys_sendmsg+0x319/0x400 [ 591.155682][T19528] ? ____sys_sendmsg+0x900/0x900 [ 591.160628][T19528] ? __might_fault+0xb8/0x110 [ 591.165318][T19528] ? __lock_acquire+0x5e40/0x5e40 [ 591.170351][T19528] ? set_normalized_timespec64+0x118/0x1e0 [ 591.176167][T19528] ? ns_to_timespec64+0xa0/0xa0 [ 591.181021][T19528] ? __might_fault+0xb4/0x110 [ 591.185737][T19528] ? lockdep_hardirqs_on_prepare+0x3e2/0x750 [ 591.191733][T19528] ? syscall_enter_from_user_mode+0x24/0x190 [ 591.197729][T19528] ? syscall_enter_from_user_mode+0x24/0x190 [ 591.203713][T19528] do_syscall_64+0x2d/0x70 [ 591.208149][T19528] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 591.214046][T19528] RIP: 0033:0x45e219 [ 591.217957][T19528] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 591.237560][T19528] RSP: 002b:00007ffaae422c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 591.245982][T19528] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 591.253955][T19528] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 591.261926][T19528] RBP: 000000000119c068 R08: 0000000000000000 R09: 0000000000000000 [ 591.269902][T19528] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119c034 [ 591.277874][T19528] R13: 00007ffd189291ff R14: 00007ffaae4239c0 R15: 000000000119c034 [ 591.286797][T19528] Kernel Offset: disabled [ 591.294513][T19528] Rebooting in 86400 seconds..