40)=@base={0x1, 0x4, 0x3e, 0xc00}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x4}, 0x38) 23:34:44 executing program 1: syz_clone3(&(0x7f0000000280)={0x80, 0x0, 0x0, 0x0, {}, &(0x7f0000000140)=""/9, 0x9, 0x0, &(0x7f0000000240)=[0x0], 0x1}, 0x58) 23:34:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x4}, 0x48) [ 2956.022225][ T27] audit: type=1804 audit(1689204884.438:3817): pid=22528 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2545/file0" dev="sda1" ino=1975 res=1 errno=0 [ 2956.129060][ T27] audit: type=1804 audit(1689204884.468:3818): pid=22529 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/953/file0" dev="sda1" ino=1976 res=1 errno=0 23:34:44 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:44 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x0, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:44 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc0405519, 0x0) [ 2956.320327][ T27] audit: type=1804 audit(1689204884.728:3819): pid=22539 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/954/file0" dev="sda1" ino=1966 res=1 errno=0 [ 2956.395973][ T27] audit: type=1804 audit(1689204884.808:3820): pid=22543 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2546/file0" dev="sda1" ino=1967 res=1 errno=0 [ 2956.790618][T22546] loop0: detected capacity change from 0 to 40427 [ 2956.808714][T22546] F2FS-fs (loop0): Found nat_bits in checkpoint 23:34:45 executing program 0: syz_mount_image$f2fs(&(0x7f00000055c0), &(0x7f0000000080)='./file0\x00', 0x800001, &(0x7f0000000440)=ANY=[], 0x4, 0x54ff, &(0x7f00000000c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc010f508, 0x0) 23:34:45 executing program 4: io_uring_setup(0x5ed5, &(0x7f0000000ac0)={0x0, 0x0, 0x100}) 23:34:45 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0x541b, 0x0) 23:34:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}}, 0x0) 23:34:45 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:45 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) [ 2956.846856][T22546] F2FS-fs (loop0): recover fsync data on readonly fs [ 2956.854159][T22546] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5 23:34:45 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000880)={0x0, 0x0, 0x38}, 0x10) 23:34:45 executing program 1: syz_open_dev$sndctrl(&(0x7f0000000400), 0x0, 0x802) 23:34:45 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, &(0x7f0000000040)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}}) syz_clone3(&(0x7f0000000280)={0x80, &(0x7f0000000080)=0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x0, {}, &(0x7f0000000140)=""/9, 0x9, &(0x7f0000000180)=""/129, 0x0}, 0x58) r3 = pidfd_getfd(r1, r0, 0x0) r4 = getpid() r5 = syz_open_dev$vcsu(&(0x7f0000000500), 0x0, 0x101000) syz_clone3(&(0x7f0000000540)={0x1a8900100, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), {}, &(0x7f00000003c0)=""/143, 0x8f, &(0x7f0000000480)=""/63, &(0x7f00000004c0)=[r2, r4], 0x2, {r5}}, 0x58) sendmsg$NFT_MSG_GETSET(r5, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0x4004001}, 0x800) r6 = syz_open_dev$vcsu(&(0x7f0000000700), 0x0, 0x200) ioctl$PPPIOCGCHAN(r6, 0x80047437, &(0x7f0000000740)) socket(0x5, 0x80000, 0x9344) fsopen(&(0x7f0000000780)='omfs\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r5, 0x5, &(0x7f00000007c0)='/dev/rfkill\x00', 0x0, r1) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000800), 0x0, 0x0) read$rfkill(r0, &(0x7f0000000840), 0x8) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) read$rfkill(0xffffffffffffffff, &(0x7f0000000900), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000940)) accept4$llc(0xffffffffffffffff, &(0x7f0000000b40)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000b80)=0x10, 0x0) r7 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r3, 0x4c0a, &(0x7f0000000c00)={r7, 0x2, {0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x0, 0x6, 0x0, 0x8, "8190f2f4a2c4ad95f36e957ee80620e720813fec08adeed53c0ccd24e1dd283a11d74ce97546801f3701d8d8ebf828fbdc257670c6b29d5d0c99c0f00600039e", "d755ed13f82e20f49939cd2d1cd691e0733df9fae2838785777931c1f9671925946c95ae258b492d1ce67706c776fba5c1a5be1b0c159378ff4dbda4abdf8f46", "bbc5a0bf22f0cc234f6cb5e0034f05efe9074e105a2f04aed99eeaebf0557df1", [0x9, 0xfffffffffffffff8]}}) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000d40)={0x0, r6}, 0x10) r8 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000d80), 0x200440, 0x0) r9 = socket$rxrpc(0x21, 0x2, 0xa) ioctl$LOOP_CHANGE_FD(r8, 0x4c06, r9) r10 = syz_clone3(0x0, 0x0) syz_open_procfs(r10, &(0x7f0000001080)='net/if_inet6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f00000011c0)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001180)={&(0x7f0000001100)={0x54, 0x0, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x5c}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @SEG6_ATTR_SECRETLEN={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x40804}, 0x4000000) 23:34:45 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_QUERYBUF_DMABUF(r0, 0xc0585609, &(0x7f0000000080)={0x0, 0xc, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "f8beb60f"}}) 23:34:45 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:45 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000100)={0x3, 0x8, [0x0, 0x0]}) [ 2957.922112][T22576] loop0: detected capacity change from 0 to 40427 [ 2957.936183][T22576] F2FS-fs (loop0): Found nat_bits in checkpoint [ 2957.991279][T22576] F2FS-fs (loop0): recover fsync data on readonly fs [ 2958.007240][T22576] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5 23:34:46 executing program 1: socketpair(0x28, 0x0, 0x8000, &(0x7f0000000000)) 23:34:46 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:46 executing program 0: syz_mount_image$f2fs(&(0x7f00000055c0), &(0x7f0000000080)='./file0\x00', 0x800001, &(0x7f0000000440)=ANY=[], 0x4, 0x54ff, &(0x7f00000000c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc010f508, 0x0) 23:34:46 executing program 5: socketpair(0x1d, 0x2, 0x0, &(0x7f0000000100)) 23:34:46 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc0505510, 0x0) 23:34:46 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:46 executing program 1: pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000015c0)={0x11, 0x3, &(0x7f00000012c0)=@framed, &(0x7f0000001300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001400), 0x10}, 0x80) 23:34:46 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:46 executing program 4: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 23:34:46 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) [ 2958.284729][T22579] can: request_module (can-proto-0) failed. 23:34:46 executing program 5: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000900), r0) 23:34:46 executing program 1: pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$nl_route(r0, 0x0, 0x0) 23:34:46 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x800001, &(0x7f0000000440)=ANY=[], 0x4, 0x5510, &(0x7f0000005600)="$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") 23:34:46 executing program 1: syz_open_dev$sndctrl(&(0x7f0000002c40), 0x0, 0x400) [ 2959.336052][T22606] loop5: detected capacity change from 0 to 40427 [ 2959.356934][T22606] F2FS-fs (loop5): Invalid segment count (0) [ 2959.371651][T22606] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 2959.406019][T22606] F2FS-fs (loop5): Found nat_bits in checkpoint [ 2959.453362][T22608] loop0: detected capacity change from 0 to 40427 [ 2959.479765][T22606] F2FS-fs (loop5): recover fsync data on readonly fs [ 2959.482487][T22608] F2FS-fs (loop0): Found nat_bits in checkpoint [ 2959.487449][T22606] F2FS-fs (loop5): Try to recover 1th superblock, ret: -30 [ 2959.508757][T22606] F2FS-fs (loop5): Mounted with checkpoint version = 48b305e5 [ 2959.555599][T22608] F2FS-fs (loop0): recover fsync data on readonly fs [ 2959.569850][T22608] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5 23:34:48 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x800001, &(0x7f0000000440)=ANY=[], 0x4, 0x5510, &(0x7f0000005600)="$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") 23:34:48 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(0x0, r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:48 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) 23:34:48 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "a1209b3a0d5be6ecb79de72a65dbdbaa9854ad09fd7cdbdcf67a08a15d33b56200f4fdc22e8784d49136c9564fca4cad5235c8433c718633af3638d2e9ea2a"}, 0x60) 23:34:48 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={r1}) 23:34:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) 23:34:48 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "a1209b3a0d5be6ecb79de72a65dbdbaa9854ad09fd7cdbdcf67a08a15d33b56200f4fdc22e8784d49136c9564fca4cad5235c8433c718633af3638d2e9ea2a"}, 0x60) [ 2959.703533][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 2959.703549][ T27] audit: type=1804 audit(1689204888.118:3828): pid=22615 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/958/file0" dev="sda1" ino=1967 res=1 errno=0 [ 2959.804881][ T27] audit: type=1804 audit(1689204888.138:3829): pid=22618 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2551/file0" dev="sda1" ino=1975 res=1 errno=0 23:34:48 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$hiddev(r0, 0x0, 0x0) 23:34:48 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:48 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000500)='ns/ipc\x00') 23:34:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) [ 2960.043896][ T27] audit: type=1804 audit(1689204888.458:3830): pid=22630 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2552/file0" dev="sda1" ino=1964 res=1 errno=0 [ 2960.483540][T22635] loop5: detected capacity change from 0 to 40427 [ 2960.491354][T22635] F2FS-fs (loop5): Invalid segment count (0) [ 2960.497431][T22635] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 2960.510508][T22635] F2FS-fs (loop5): Found nat_bits in checkpoint [ 2960.553014][T22635] F2FS-fs (loop5): recover fsync data on readonly fs [ 2960.560153][T22635] F2FS-fs (loop5): Try to recover 1th superblock, ret: -30 [ 2960.568019][T22635] F2FS-fs (loop5): Mounted with checkpoint version = 48b305e5 23:34:49 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x800001, &(0x7f0000000440)=ANY=[], 0x4, 0x5510, &(0x7f0000005600)="$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") 23:34:49 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(0x0, r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:49 executing program 0: pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000000)={0x2, 0x0, [{}, {}]}) 23:34:49 executing program 1: bpf$BPF_GET_PROG_INFO(0xe, 0x0, 0x0) 23:34:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) 23:34:49 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(0x0, r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:49 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) [ 2960.652632][ T27] audit: type=1804 audit(1689204889.068:3831): pid=22645 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2553/file0" dev="sda1" ino=1975 res=1 errno=0 23:34:49 executing program 0: ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, 0x0) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000002c0)) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, 0x0) 23:34:49 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f0000008a80), 0x4) 23:34:49 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(0x0, r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) [ 2960.753018][ T27] audit: type=1804 audit(1689204889.108:3832): pid=22641 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/959/file0" dev="sda1" ino=1976 res=1 errno=0 23:34:49 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(0x0, r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:49 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) [ 2960.930826][ T27] audit: type=1804 audit(1689204889.338:3833): pid=22657 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2554/file0" dev="sda1" ino=1975 res=1 errno=0 [ 2961.030252][ T27] audit: type=1804 audit(1689204889.428:3834): pid=22660 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/960/file0" dev="sda1" ino=1959 res=1 errno=0 [ 2961.435145][T22665] loop5: detected capacity change from 0 to 40427 [ 2961.443024][T22665] F2FS-fs (loop5): Invalid segment count (0) [ 2961.449051][T22665] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 2961.461715][T22665] F2FS-fs (loop5): Found nat_bits in checkpoint [ 2961.501465][T22665] F2FS-fs (loop5): recover fsync data on readonly fs [ 2961.509271][T22665] F2FS-fs (loop5): Try to recover 1th superblock, ret: -30 [ 2961.516856][T22665] F2FS-fs (loop5): Mounted with checkpoint version = 48b305e5 23:34:49 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x800001, &(0x7f0000000440)=ANY=[], 0x4, 0x5510, &(0x7f0000005600)="$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") 23:34:49 executing program 1: io_uring_setup(0x5ed5, &(0x7f0000000ac0)={0x0, 0x0, 0x400}) 23:34:49 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) 23:34:49 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(0x0, r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:49 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) 23:34:49 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:50 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) 23:34:50 executing program 1: syz_clone3(&(0x7f0000000280)={0x80, 0x0, 0x0, 0x0, {}, &(0x7f0000000140)=""/9, 0x9, 0x0, 0x0}, 0x58) syz_open_dev$vcsu(0x0, 0x0, 0x0) [ 2961.630990][ T27] audit: type=1804 audit(1689204890.038:3835): pid=22672 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2555/file0" dev="sda1" ino=1967 res=1 errno=0 [ 2961.743378][ T27] audit: type=1804 audit(1689204890.088:3836): pid=22675 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/961/file0" dev="sda1" ino=1976 res=1 errno=0 23:34:50 executing program 0: syz_open_dev$hiddev(&(0x7f0000000680), 0x0, 0x0) 23:34:50 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:50 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) 23:34:50 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) [ 2961.969528][ T27] audit: type=1804 audit(1689204890.378:3837): pid=22689 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2556/file0" dev="sda1" ino=1974 res=1 errno=0 [ 2962.676262][T22693] loop5: detected capacity change from 0 to 40427 [ 2962.691521][T22693] F2FS-fs (loop5): Invalid segment count (0) [ 2962.701110][T22693] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 2962.733800][T22693] F2FS-fs (loop5): Found nat_bits in checkpoint [ 2962.785239][T22693] F2FS-fs (loop5): recover fsync data on readonly fs [ 2962.792627][T22693] F2FS-fs (loop5): Try to recover 1th superblock, ret: -30 [ 2962.799974][T22693] F2FS-fs (loop5): Mounted with checkpoint version = 48b305e5 23:34:51 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:51 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0x0, 0x9, 0x0, 0x0, 0x1}, 0x48) 23:34:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x3, &(0x7f0000000540)=@framed, &(0x7f00000005c0)='GPL\x00', 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:34:51 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) 23:34:51 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:51 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, &(0x7f0000000040)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}}) syz_clone3(&(0x7f0000000280)={0x80, &(0x7f0000000080)=0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x0, {}, 0x0, 0x0, &(0x7f0000000180)=""/129, 0x0}, 0x58) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r4 = getpid() r5 = syz_open_dev$vcsu(&(0x7f0000000500), 0x0, 0x101000) syz_clone3(&(0x7f0000000540)={0x1a8900100, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), {}, &(0x7f00000003c0)=""/143, 0x8f, &(0x7f0000000480)=""/63, &(0x7f00000004c0)=[r2, r4], 0x2, {r5}}, 0x58) sendmsg$NFT_MSG_GETSET(r5, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0x4004001}, 0x800) r6 = syz_open_dev$vcsu(&(0x7f0000000700), 0x0, 0x0) ioctl$PPPIOCGCHAN(r6, 0x80047437, &(0x7f0000000740)) socket(0x5, 0x80000, 0x9344) fsopen(&(0x7f0000000780)='omfs\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r5, 0x5, &(0x7f00000007c0)='/dev/rfkill\x00', 0x0, r1) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000800), 0x0, 0x0) read$rfkill(r0, &(0x7f0000000840), 0x8) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) read$rfkill(0xffffffffffffffff, &(0x7f0000000900), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000940)) accept4$llc(0xffffffffffffffff, &(0x7f0000000b40)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000b80)=0x10, 0x0) r7 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r3, 0x4c0a, &(0x7f0000000c00)={r7, 0x2, {0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x0, 0x6, 0x0, 0x8, "8190f2f4a2c4ad95f36e957ee80620e720813fec08adeed53c0ccd24e1dd283a11d74ce97546801f3701d8d8ebf828fbdc257670c6b29d5d0c99c0f00600039e", "d755ed13f82e20f49939cd2d1cd691e0733df9fae2838785777931c1f9671925946c95ae258b492d1ce67706c776fba5c1a5be1b0c159378ff4dbda4abdf8f46", "bbc5a0bf22f0cc234f6cb5e0034f05efe9074e105a2f04aed99eeaebf0557df1", [0x9, 0xfffffffffffffff8]}}) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000d40)={0x0, r6}, 0x10) r8 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000d80), 0x200440, 0x0) ioctl$LOOP_CHANGE_FD(r8, 0x4c06, 0xffffffffffffffff) r9 = syz_clone3(0x0, 0x0) syz_open_procfs(r9, &(0x7f0000001080)='net/if_inet6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f00000011c0)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001180)={&(0x7f0000001100)={0x54, 0x0, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x5c}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @SEG6_ATTR_SECRETLEN={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x40804}, 0x4000000) 23:34:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 23:34:51 executing program 0: socketpair(0x22, 0x0, 0x1f, &(0x7f0000000000)) 23:34:51 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:51 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:51 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) 23:34:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 23:34:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x1, &(0x7f0000000000)=@raw=[@func], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:34:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) [ 2963.345812][T22714] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:34:51 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:51 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:51 executing program 1: ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000000000)={0x6, 0x0, [{0x400, 0x400, 0x0, [0x5, 0xc2, 0x6, 0x0, 0x2, 0xe79, 0x9e0, 0x4]}, {0x7, 0x0, 0x0, [0x8, 0x7, 0x1, 0x3, 0x0, 0x9]}, {0x0, 0xffffffff, 0x0, [0x0, 0x2, 0x0, 0x0, 0xc63, 0x0, 0x7]}, {0xd9f, 0x0, 0x0, [0x7f, 0x0, 0x100, 0x8, 0x0, 0x4, 0x729, 0x7]}, {0x5, 0xb69e, 0x0, [0x6, 0x0, 0x9, 0x0, 0x1, 0x7fffffff]}, {0x4, 0x7, 0xeda8, [0x0, 0x5, 0x2b54, 0x4, 0x0, 0x2, 0x0, 0x1f]}]}) r0 = syz_open_dev$sndctrl(0x0, 0x7f, 0x20000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000240)=0x3) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x100, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r1, 0x3304) [ 2963.562182][T22729] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2963.588255][T22725] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:34:52 executing program 5: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000340)) 23:34:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 23:34:52 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) 23:34:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x480, 0x0, 0xffffffff, 0xf0, 0x338, 0x5c0, 0x5c0, 0xffffffff, 0x5c0, 0x5c0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4, @ipv6=@empty, @gre_key, @gre_key}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @dev, [], [], 'pim6reg1\x00', 'vlan0\x00'}, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@dev, @ipv4=@empty, @port, @icmp_id}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @private1, [], [], 'bridge0\x00', 'nr0\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@remote, @ipv6=@local, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@dev, @ipv6=@private2, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 23:34:52 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:52 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) [ 2963.831980][ T1255] ieee802154 phy0 wpan0: encryption failed: -22 [ 2963.838359][ T1255] ieee802154 phy1 wpan1: encryption failed: -22 23:34:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 23:34:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000440)={@val={0x0, 0x86dd}, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "35ecd7", 0x28, 0x2f, 0x0, @private0, @mcast2, {[@hopopts={0x0, 0x1, '\x00', [@ra, @jumbo]}], @ndisc_ra}}}}, 0x5e) [ 2963.901528][T22741] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:34:52 executing program 0: bpf$BPF_GET_PROG_INFO(0x21, 0x0, 0x0) 23:34:52 executing program 1: fsopen(&(0x7f0000000780)='omfs\x00', 0x0) [ 2963.976288][T22742] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:34:52 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:52 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, 0x0, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:52 executing program 0: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000400)={@map, 0xffffffffffffffff, 0x2e}, 0x14) 23:34:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 23:34:52 executing program 1: syz_open_dev$sndctrl(&(0x7f0000000500), 0x0, 0x40) 23:34:52 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000004180)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) [ 2964.229626][T22758] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:34:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 23:34:52 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, 0x0, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:52 executing program 5: pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) [ 2964.274177][T22760] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:34:52 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, 0x0, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:52 executing program 0: openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:34:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 23:34:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000002600)=ANY=[@ANYBLOB="000086dd0500000000000020"], 0x211d) [ 2964.477102][T22772] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:34:53 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x34}}, 0x0) 23:34:53 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, 0x0, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) [ 2964.585409][T22779] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:34:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 23:34:53 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2964.736042][ T27] kauditd_printk_skb: 13 callbacks suppressed [ 2964.736060][ T27] audit: type=1804 audit(1689204893.148:3851): pid=22790 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/969/file0" dev="sda1" ino=1955 res=1 errno=0 [ 2964.776527][T22790] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:34:53 executing program 1: ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, 0x0) r0 = syz_open_dev$sndctrl(0x0, 0x7f, 0x20000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000001c0)=""/76) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000240)=0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x100, 0x0) 23:34:53 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, 0x0, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x1c, 0x24, 0x0, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) 23:34:53 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x690, 0x480, 0x0, 0xffffffff, 0xf0, 0x338, 0x5c0, 0x5c0, 0xffffffff, 0x5c0, 0x5c0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@rand_addr=0x64010100, @ipv6=@empty, @gre_key=0x9, @gre_key=0x3}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @dev, [0xff, 0xffffff00, 0xff000000], [0x0, 0x0, 0xffffff00], 'pim6reg1\x00', 'vlan0\x00', {}, {}, 0x33, 0x1}, 0x0, 0x200, 0x248, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'nicvf0\x00', {0x0, 0x0, 0x0, 0xf1a, 0x0, 0x0, 0x2}, {0xfff}}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x37}, @ipv4=@empty, @port, @icmp_id}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @private1, [0x0, 0x0, 0xff], [0x0, 0x0, 0xff000000], 'bridge0\x00', 'nr0\x00', {}, {}, 0x0, 0x9}, 0x0, 0x100, 0x148, 0x0, {}, [@common=@ipv6header={{0x28}, {0x0, 0x80}}, @common=@unspec=@connmark={{0x30}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@remote, @ipv6=@local, @icmp_id}}}, {{@uncond, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@mh={{0x28}, {"4aad"}}, @common=@mh={{0x28}, {"9438"}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@dev, @ipv6=@private2, @icmp_id=0x67, @port=0x4e22}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6f0) 23:34:53 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc0045878, 0x0) [ 2964.924061][ T27] audit: type=1804 audit(1689204893.318:3852): pid=22798 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2563/file0" dev="sda1" ino=1960 res=1 errno=0 [ 2964.931060][T22798] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:34:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x1c, 0x24, 0x0, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) [ 2965.035507][T22805] x_tables: duplicate underflow at hook 1 [ 2965.061917][ T27] audit: type=1804 audit(1689204893.468:3853): pid=22806 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/970/file0" dev="sda1" ino=1970 res=1 errno=0 [ 2965.272880][T22806] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:34:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x18, 0x2, &(0x7f0000000ac0)=@raw=[@cb_func], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:34:53 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000940)={'wpan3\x00'}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000cc0)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000cc0)={'wpan4\x00'}) syz_genetlink_get_family_id$nfc(&(0x7f0000000980), r1) 23:34:53 executing program 1: pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)={0x0, 0x3938700}, 0x0) 23:34:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x1c, 0x24, 0x0, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) 23:34:53 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, 0x0, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:53 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x14, 0x24, 0x1}, 0x14}}, 0x0) 23:34:53 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000480), 0x4) 23:34:54 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000080)) 23:34:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x14, 0x24, 0x1}, 0x14}}, 0x0) [ 2965.513097][ T27] audit: type=1804 audit(1689204893.928:3854): pid=22823 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/971/file0" dev="sda1" ino=1956 res=1 errno=0 [ 2965.552029][T22824] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2965.639304][ T27] audit: type=1804 audit(1689204893.958:3855): pid=22824 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2564/file0" dev="sda1" ino=1963 res=1 errno=0 23:34:54 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newspdinfo={0x14, 0x24, 0x1}, 0x14}}, 0x0) 23:34:54 executing program 1: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) io_uring_setup(0x49e4, &(0x7f0000001200)={0x0, 0xefd0, 0x2, 0x0, 0xce}) 23:34:54 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000000)=0x9774) 23:34:54 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:54 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000015c0)={0x11, 0x4, &(0x7f00000012c0)=@framed={{}, [@alu]}, &(0x7f0000001300)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:34:54 executing program 4: socketpair(0x11, 0x0, 0x0, &(0x7f0000003700)) 23:34:54 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000000)=0x9774) 23:34:54 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0x81785501, 0x0) [ 2965.902213][ T27] audit: type=1804 audit(1689204894.318:3856): pid=22843 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2565/file0" dev="sda1" ino=1964 res=1 errno=0 [ 2965.937822][T22843] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:34:54 executing program 1: pselect6(0x40, &(0x7f0000000380), 0x0, &(0x7f0000000400)={0x40, 0x9, 0x9, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000440)={0x0, 0x3938700}, &(0x7f00000004c0)={&(0x7f0000000480)={[0x3f]}, 0x8}) 23:34:54 executing program 4: syz_open_dev$vcsu(&(0x7f0000000500), 0x0, 0x0) [ 2966.025729][ T27] audit: type=1804 audit(1689204894.408:3857): pid=22850 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/972/file0" dev="sda1" ino=1973 res=1 errno=0 23:34:54 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000000)=0x9774) 23:34:54 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:54 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000c00)=@newlink={0x44, 0x10, 0x405, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_BCAST_FLOOD={0x5, 0x2b}]}}}]}, 0x44}}, 0x0) 23:34:54 executing program 5: syz_clone3(&(0x7f0000000540)={0x1a8900100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[0x0], 0x1}, 0x58) 23:34:54 executing program 4: syz_mount_image$btrfs(&(0x7f00000055c0), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f626172726965722c737562766f6c69643d2078303030303030303030726561642c73706163655f63766368653d76322c6175746f64006672616735f66e6f7370635f646562c9be6c6e610ad1ac3e5fa72dc1670a75672c73706163655f63616368653d76322c6e6f1a340c6ebf8dcacc7dca0173cc3ad2666d7573686f6e636f6d6d69742c7573656261636b7570726f6f742c64e1010044a750738473756d2c000a3df1f0db33d83fc69e931b3e1ff5634bb3d910c9f725db796714c65c9b67f4dfb78b62d0dce78e200a91c33cb1ff2daff8b725c007536eff8fdc00"/236], 0x1, 0x55a8, &(0x7f000000ac40)="$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") [ 2966.247946][ T27] audit: type=1804 audit(1689204894.658:3858): pid=22865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/973/file0" dev="sda1" ino=1964 res=1 errno=0 23:34:54 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000000)=0x9774) 23:34:54 executing program 1: syz_clone3(&(0x7f0000000280)={0x80, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0x0], 0x1}, 0x58) [ 2966.354130][ T27] audit: type=1804 audit(1689204894.718:3859): pid=22868 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2566/file0" dev="sda1" ino=1973 res=1 errno=0 23:34:54 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:54 executing program 5: sched_rr_get_interval(0x0, &(0x7f0000002d00)) 23:34:54 executing program 0: ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000000)=0x9774) 23:34:54 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:55 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0x80045500, 0x0) 23:34:55 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20000023896) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000023896) io_submit(0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x80000, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) [ 2966.550469][ T27] audit: type=1804 audit(1689204894.958:3860): pid=22881 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/974/file0" dev="sda1" ino=1968 res=1 errno=0 23:34:55 executing program 0: ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000000)=0x9774) 23:34:55 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:55 executing program 0: ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000000)=0x9774) [ 2967.085196][T22873] loop4: detected capacity change from 0 to 32768 23:34:55 executing program 4: syz_mount_image$btrfs(&(0x7f00000055c0), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f626172726965722c737562766f6c69643d2078303030303030303030726561642c73706163655f63766368653d76322c6175746f64006672616735f66e6f7370635f646562c9be6c6e610ad1ac3e5fa72dc1670a75672c73706163655f63616368653d76322c6e6f1a340c6ebf8dcacc7dca0173cc3ad2666d7573686f6e636f6d6d69742c7573656261636b7570726f6f742c64e1010044a750738473756d2c000a3df1f0db33d83fc69e931b3e1ff5634bb3d910c9f725db796714c65c9b67f4dfb78b62d0dce78e200a91c33cb1ff2daff8b725c007536eff8fdc00"/236], 0x1, 0x55a8, &(0x7f000000ac40)="$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") 23:34:55 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002540)) 23:34:55 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:55 executing program 0: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000000)=0x9774) 23:34:55 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:55 executing program 0: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000000)=0x9774) 23:34:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x8}, @NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x420}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 23:34:55 executing program 0: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000000)=0x9774) [ 2967.439596][T22906] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:34:55 executing program 5: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000000c0), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f00000000c0)=0x5, 0x4) sendmmsg(r2, &(0x7f0000005440)=[{{0x0, 0xfffffffffffffcfb, 0x0}, 0xc000000}], 0xfb93a852dd518c, 0x101d0) 23:34:55 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:55 executing program 1: ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, &(0x7f0000000040)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}}) syz_clone3(0x0, 0x0) syz_clone3(0x0, 0x0) socket(0x5, 0x80000, 0x9344) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000008c0)='net/snmp\x00') ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x4c0a, 0x0) 23:34:55 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) [ 2967.656241][T22921] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2968.162545][T22907] loop4: detected capacity change from 0 to 32768 23:34:56 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000080), 0x1, 0x2) ioctl$VIDIOC_QUERYBUF_DMABUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x2, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c1fb9fcc"}}) 23:34:56 executing program 0: syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000000)=0x9774) 23:34:56 executing program 4: syz_mount_image$btrfs(&(0x7f00000055c0), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f626172726965722c737562766f6c69643d2078303030303030303030726561642c73706163655f63766368653d76322c6175746f64006672616735f66e6f7370635f646562c9be6c6e610ad1ac3e5fa72dc1670a75672c73706163655f63616368653d76322c6e6f1a340c6ebf8dcacc7dca0173cc3ad2666d7573686f6e636f6d6d69742c7573656261636b7570726f6f742c64e1010044a750738473756d2c000a3df1f0db33d83fc69e931b3e1ff5634bb3d910c9f725db796714c65c9b67f4dfb78b62d0dce78e200a91c33cb1ff2daff8b725c007536eff8fdc00"/236], 0x1, 0x55a8, &(0x7f000000ac40)="$eJzs3X1sVWcdB/Bz25UiL21ndGnjCyyOgOAIrk4HRFqLGF7mrG2ygXuhTuPAOSxkiOKadYOQzc1aNot2MphEp0yRSgbIFkdxCegs2UxcV8Ut4OoLjVuY7IW5+ZLee8/l3nNoe4dzndvnQ9pznvs7z3Ofe3L+uN9Ln3MDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACIJg3c2d1z3Y1vHyOVt3VN7xxNqGGeue6Tv7C633bn5gUl3FhKebHq1b2bRxevWTbcfO6qlY2D4pCBLJfol0/8U1c+s+V7/44yPDARs+mdqWlQ30lKmuh1ONETkP9vfL/fl0EARFkQEK09s56Z2CnAEyuyviAw5qwcIlO27cNr9vfemc/eO6EwfiL51+I4d7AsMlfV31nryWqpO/CyJHZNpZl14i5xJN9Y9ecK/JiwAAXpFptclN5u1o+i1upt0crUfa1ZF2a6QdvkNozW6cjtS4Iwaa5/hofZjmWZ2KCsUDzjNST5//TLs22j/SjkSNVzDP3EPTkWbkQPNsjNSHa54AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAryfvrfzLzOUv3l4yonvp9b9f86Gb5nVXvvuRr5XfUzn3Rx3L2u776qN1K5s2Tq9+su3YWT0VC9snBUFZsl8i1T1x3WVHV9WN+1jNN3754Z9eOfrOawvT44bbM7IODnrCnemlQXBlVqU3HPZoSRDU5haSzaA9Xlia3JkXFgAAAHgjqUj+Lsi0U3GwKKedSKbJRPJfKBUWFyxcsuPGbfP71pfO2T+uO3Hg9MerHWC86lOOl2mXnfxJZAXjMP5GxztZDw9dERtncNERo3n+4u27941Ztf6C5S90XjJz9l/P772h85kpVbd+/cExl25Z8c25K2P5v2zw/B+eOfkfAACA/4b8Hx1ncEPl/+Jv//aHrd95V9/2vU8d3fS3rc2r6584saGt/n0rJ9f//YJzW1+M5f/xOU8Zy//hjMP8XxCcXv4HAACA17P/df6vjo0zuKHy/4aqd0xZc33XHZsnbhp76+pn//HS/TMe/nnxZ6Yuftvsp/bN3Lg7lv+n5Zf/z8iedvhgVzjhq0uDYFr+JxUAAADIEf6/+8mPFsK8nvrkIJrXb9tVtXfbxglfunzMn+8+N3Fi77KpNe2bj/zhoi3fTdw7veVITyz/V+eX/4tem5cLAAAA5KHx8YOX3fzr8S99qqb97l1rv79s1vbjDTs3Pd2deGvlvJaWL7bE8n9tfvm/eHheDgAAAHAKSy685hcX94296fjSP5W09jY377m84tBD1z72x6bF35v1z/JtV8Tyf0N++X9Uepte+ZDqtD/8K4TbS4NgZP9OY6pwIGityhQAAACAV0mY0888/9LPN03YXjrxW7OvuGb5nh+0H9x625EP9p5z1Vcq1v7uuXUfiOX/xsHv/x/e6SBc/59z/7/Y+v+sQuqufzPdGAAAAIA3o/h6/vD2+KlvLhjo+/fzXf9f3LWq7bld71nQXFN7/32PTX1o0aHnJ24Zs+eW5q6qd3Z/ufztsfzfnF/+L8zevprf/wcAAACn4f/t+/8WxcYZ3FD3/3/h5Z2HZx286N+/+ejaO8e2bOhJ/Kppzc+e7Tm88+jkH1ecN/ktsfzfml/+D7ejs19eZ3h+1pQGQXn/TvpuglvD6V4dKXQUZRVSJz7Soz7skS50FGcVkhojPc4rDYKz+3eaI4Uzw0JrpHCsJF24K1J4OCykr4dM4SeRQmd4pW0oSU83WtgdFtILLDrCFRSjM0siIj2OD9Sjv3DKHocyTw4AAPCmEobndJYtym0G0SjbkRjqgFFDHVAw1AGFQx1wRuSA6IEDPR405BYyA144v+D99zzw+A1TP7tvxiOjPnLV7Ckn1q/+V1fbJ55fXd+46JJY/r8rv/wfnooRqc1A6/+DcP1/+nsNM+v/G8JCWaTQERZqo3cMqA2fIxV2bwmfo6w23eNYeaYAAAAAb2jh5wKFwzwPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgP+wd+9xUlV3gsBPN/2EpmkNiaAEezBiMKFpBBI1ukFMjKujaUkwZmJi82hJh0aQh4qLE3wkGYX4WDGRjI6wjgkaJcTEFaMOrJMoM0N8P+IjjFk1SnyBuu66rrqf7lunqLrVZRcCSjvf7x9dp+p3nrceXefeW+cCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPAfw4LfnrVx4MgX/n5lv+MPX/KPa/a5e4+njjnt+ZVrjn3p289tXts46qGJ88+64qDxT122+WN/GHzCsk+G0NJVriwpXrbwxE2nT9z7iAkXrT/0l1P6XTmvKlNvJh76df4pz9w5L7b6dP8Qbi4LoSIdGFmXBCoz9+tifUPqQtgtbA1kS7T1TUqkGw6/qw1hedgayFZ1S20IdTmBr95/x9ofdiaW1oawbwihOt3GH6uTNmrTgeFVSaBvOjCrIgn873cS2cCa8iQA2y2+GbIv+tUt+Rkaui9X5PVXucM69sFKD69PTDQUz/fiYTu5Uzmq0g+0bNfTVlAdO0XB22Odd1sveLcVbOeLPW25X6Qy31De2RqqDuXT2k6ePL9jXnykPDQ19SlW0056nh/bsnDqtqR7zeswdqBhh7wON1/+yqTm/scMumHCpiFjT1q2bHu7WWzz7mzVIfOa6zXPYzTe50kvePsVfEtq9KUrhPCfvzvm7BMrDjritoOXvjHm8Gv67TXp84fu9uI1bR/f+/jd7/rymZsK5v8N7z7/jy/neFuelzu2+mZ9MjePj9TFxMv1ydwcAAAAeo3esNf00h+Nmtrv6FsfnVy556xFf//fhrVeMXDT+YNu3f8PBzUd8ZVBK75eMP9vLO34fzzkX5c72nUhjO9KnDsghEFdjyeBa2N3pgwI4a+6Ui35gcNSgXUhDO5KjMhWlSpRE0s0pgLP1mcC41OBO2OgJRW4JgYuTgXOi4HVqcDUGFiXCkyIgdCeP4796zPjKDlQGwOtyUZcHc9CeLU+tpbaVo9nqwIAANhBMrPDyvy7Oec6bG+GOL1cXdtThngGdtEM1aka0jPY7LSqaA0VPdVQ3lMN2XEvevfhF9Rc1lPNBadhlOVnuK/h6sOH3vv2dTO+sLF90BnrP/XZ139xxoVXXvbM/5nyP0Yt/PQPniuY/ze/+/y/upuOlBUc/w/huK6/MXd5JtKRjbe25GUAAAAAtsPgyiVrnj6070+O2vj0859af/nAe25bf+0PDrju4dbyh/dcumrQXgXz//Glnf8f94n0yckcNsTdEDMGhNCcH0iq/VxhIDnq3S8TAAAAgN4gezw+eyy8PXObnKKdnk8X5m/ZxvzxwP/4bvPXXPDc93+37JL/d+XU//5fvzDt53/35W8997nqo74258ZvH/3vIyb/rPD3/y2lnf/fN/826cSdsReXDgihJidwV+xlZ6BLYww8+fn8QGb8d8YNsDhWlTkxIVvV4liiNQaaU4HlxUrcmy0xKD+QebKyjZ+bHUd7pkROAAAAAN53cXdAPC4fz/+vn/yjw7dc8Ppfr3/r+WUvPfrCD/Yd9tnW4f8w+NbPDP/u7z+z70MLC+b/rdt2/n/XPLjg9P6OfiGMqgihT/qHARv6JgsDxkBdWSZxe9+krj7pqs7uG8IhnQNLV/WnzPr/Fek1Bu+vTaqKgUHDVm4Z3pm4ujaEUbmBh7+xYlxnYl4qkG18Um0Ie3eONt34TTVJ45Xpxn9cE8LQnEC2qik1IXQ2VpWu6o7qzHUM0lX9ojqEj+QEslV9pjqEBQGAXir+K52W++DcBWfOmNzR0TZnJybiPvzacHJ7R1vT1Fkd06qL9Glaqs95yxidXTimUq9880RmiaIHL3i0oZR09neCzbltZfbjF5w4mLkfvwtVdo3zgMq8u2PSQ/7kPoVNhJxvUsWGXL6Th9w3t5KtT2JB/TF/VegXaubPbZvTdMbkefPmjE7+lpr9gORvPMyUbKvR6W3Vt7u+lfDyKLpaVsp73Vb75VYyat7M2aPmLjhzZPvMydPbpredMubAsWMPHDd29JhxozpH1Zz87WGo+3VXdWqo76wocVw7cKh7VuRU8n58akhISPS2xE3HXt/4QMf1d9S2jbz/4I6T7r5q1r8+Pv6MI3/b9K9L5q9aULlHwfx/9rvP/+OnTvzkz6zPUOz4f0M8zJ88vvUwf2sMLC/1+H9DsaP52RMDGlOBRTGwyGF+AAAAPhzi7si4NzPulb59yZbV9x7/0Z8ffOnvd/9szdy9Nkz98XXfa3up5leHtf954qFNhxXM/xeV9vv/HbT+f3bp+qOKLfM/IpZoLrb+f3qZ/+z6/4uKrf+fXuY/u/7/8g9g/f/52UBqk7xq/X8AAODD4P1b/7/H5f3TFwgoyNDj8v7pCwQUZOhxGf9SLxCwzev/n1Yz7K9PvOCLVVu+NOCV1Xfs+/NPTD/+xX9/fObfnDjyiC+eNOXTtxbM/y8ubf5v4X4AAADYdXzptz9tv3vsWQOffO2fxpy+uO3UtRdM+p+zrr9nn8fXr7qqz5SNTxTM/5eXNv9//9f/C8XO/28sFmgptjCg9f8AAADopYqt/3fTg7W/OXrw2Q2vnrr8uoF7P3TqgDk3PvjAk3cNG3pR1U0L5i95oGD+v7q0+X887aI8L3fszZv1yZp2Ib2m3cv12Z8MAAAAQO9QHpqaKkvMm7cy6mHvvc3HMkuBvls617n/aey6B154e/GU855d+eKNT97/sZdPue3q7/3jF05/7cKhI8cvHlow/19X2vw/73cZmy9/ZVJz/2MGvXnDhE1Dxp60bNnW4/8AAADAzlPqfgkAAAAAAAAAAAAAAOCD98aKlv97x/5/PrDj8U+sqfvEhCea9h8y8adXVp/z6+8/84vW6b9cWvD7/3BcV7liv/+P1/2Lvy8YmJc7ttrz+n+Z+189etWCriULN9SHsE9uYMY5M3YLmWvz75cbWPvNEXt0Js5Jl7ht44RnOhMnpQNHjtz99c7EIalAa1wkcXA6EK+q+Hr/VCAur/hAOhC3x+p0oCoTOL9/Mo6y9LbaVJdsq7L0tnqsLoQBOYHstrq5LmmjLD3ApalAdoCnpgNxgMdmAuXpXq3ql/QqBupi0av6Jb0CAGCXFb8FVoaT2zvamuNX+Hi7Z0X+bZS3ZNnZhdWWldj8E5mlyR684NGGUtJ90t9Ft15rvDJUdw5hdMHX1dwsZV2j3DG19LDpBhYZck+rvZUXKZe2rZuuqviIapMRNU2d1TGtsseBj+k5ywEVPWYZXTDZyc1S3rVJS6ilhL6UMKISt00JXY73y0NTU59UroNjsCHk6ekVUerv9XPX+Sv2KsjNc8LuW2b+y9FXffPvNvxpw7TzL51wRNmzx1yz9oq3Nj75N4+33/jyfymY/zeUNv+vzh3X65mLASyKV9b73IAQWkscEQAAAHz43fDd6288Ydadm05eV/HIfffNKP/yCZXvLPz1wjO/99jti488/9M/2974WafV7f5kxU//+YRTvtEwfdrev6756GXnvbX21M2nvla/36u153+0YP7fWNr8P+7ByhwKTvZ2rIvX/z93QAhdl9ZvSALXxuFOGRDCX3WlWmKJ5IL6R8USzUng2rjDZEQs0dqSX1VNDKxOBZ6tzwTWpQJ3xkBmL8XKkNmVc0l9COO6Usfll5gdSzSkAl+OgcZUoCkGmlOB/jEwPhV4oX8m0JIK/FsMhPb8bfWr/pltBQAAsC0y86zK/LshPc9bXdFThrKeMvTtKUN5Txmqe8pQbBTx/o0xQ2Xq5JWynEyV6VprU7UUZIgXw9/mfhVkCPfm50wXLGg6nn+QPd+gLD/Dxx+6es131nzhpWN/s+SyN+99qvxHQ1Z8t7H2rXUbLvnxsLG7v/iDgvl/c2nz/775t0nrd8b5/9br/yWBu2L3Lo2njjfGwJOfzw9kdgzcGSe7i7NVtWRKZCbti2OJ8THQmArMjoHxqUDrcZnA8j3yA5mZdrbxc7ONt2dK5AQAAADgfRd3EMTdNHH+P7Nu0sRxo36y5I3lMxetffvCFy5ccXvHq5XjNr52zae+1ufx4bcXzP/Hlzb/j+31y23svNibp/uHcHPZ1t5kAyPrkkDcj1EXfx4/pC6E3XJ2cGRLtPVNSlSlGg6/q01+oV6VruqW2mSNgXj/q/ffsfaHnYmltSHsm7P3JdvGH6uTNmrTgeFVSaBvOjCrIgnEPT/ZwJryJADbLbtXML6gMqe6ZDV0X67I6+/Dck3Q9PAK9oF2k6+731ztLNXpBzL7VLO27WkrqI6douDtsc67rTe+2xq823K/SGW+obyzNVQdyqe1nTx5fse8+EjuL1kL7KTnOfdXqqWkd8DrcNF7723PqtMdaE59fDR3X67712FZrG7z5a9Mau5/zKAbJmwaMvakZctK7kYR8YfCI9ZM2i138+5s1SHzmut1nyctPk9647+BRk9bCGH/1pdu7X/wv+310MmrvzVqr8Hj/vJPTxwZHnl46T4Ljrlo5T63HFUw/28pbf5fkbrt8kbcmHMHhPDJnI27IW7+wwckn4M5geRT8iOFgeSQ+1P1RT85AQAAYEfL7u7I7i9oz9wmJ4Sn58mF+Vu2MX/cXzG+2/yl9vu1b7z49ozTvn7Lpe+E/oc3jJ2/5ZLjZm2cseaFh6b/cdV1x7a+UTD/b333+X9NqpuO/zv+z07i+H+3dvVd0TXpBxZt167ogurYKRz/79au/m5z/L9bjv87/t8dx/974Ph/t3b1p63gW9JsX7pCCHcf9Naqv7305iX/63uTh3xq7aTGeyq+f9iM368cvu6+q75y+5FffLlg/j+7tPm/9f+6X7Qvu/5fa7H1/2YXW/9vkfX/AACAnarIQnPpeV7B6n0FGdKr9xVk6HGBwB6XGLT+3zav//f82qf+XHf8+p/86qKqRz5y+ohBQ0945sDpl1859IcPbNz87P5f21gw/19U2vw/vhz65bbeW9b/azyuSFUXx8BsCwMCAACwKyq2gwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAP1nlfP+u0xcNem/bP35p4991fuW7PsqFPPPIPf/nWPafUHvLCd2YM/PhDE+efdcVB45+6bPPH/jD4hGWfDKG9q1xZUrxs4YmbTp+49xETLlp/6C+n9LtyXnWm3srM7V55uWOrb9aHsDznkbqYeLm+887WwFePXrWgojOxoT6EfXIDM86ZsVtn4pr6EPbLDaz95og9OhPnpEvctnHCM52Jk9KBI0fu/npn4pBMoCzd3Sv6J90tS3f3h/1DGJATyHb3O/3zq8q28aVMoDzdxs/qkjZioC4WvbwuaSMGOmKJ9poQRlWE0Cdd1b9UJ1X1SVf1m+qkqj7pqv62OoRDQggV6ao2ViVVVaRHfk9VUlUMDBq2csvwzsTyqhBG5QYe/saKcZ2JU1OBbOMTq0LYu/Mlk278xsqk8cp040srQxgaQqhKl3itIilRlS7xp4oQPpITyDb+7YoQFgQ+FOKHz7TcB+cuOHPG5I6Otjk7MVGVaas2nNze0dY0dVbHtOpUn4opy0m/c/Z7H/sTWxZO7bx98IJHG0pJV2TKVXZ1+YDKvLtjdvXex371za1k6/NRUH/MXxX6hZr5c9vmNJ0xed68OaOTv6VmPyD52ycTTbbV6N6yrfbLrWTUvJmzR81dcObI9pmTp7dNbztlzIFjxx44buzoMeNGdY6qOfm7I4a64v0f6p4VOZW8Hx8AEhISvS1Rnvfp1ryrf5AXfNHf2tHKUN31AV0wrcjNUtY1yh0x6MPe44jfy/eUHkc0umDiUJDlgJ6zjCmYTGzNUptk6fpeVzA5zK2pvGuTxvvloampT7Ht0JB/N3fzvrgdm/exzKYrNQ0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/H924EAAAAAAAMj/tRGqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqsAMHAgAAAABA/q+NUFVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVYUdOBYAAAAAEOZvHUbPBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADApQAAAP//j/n+Zw==") 23:34:56 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:56 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:56 executing program 0: syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000000)=0x9774) [ 2968.503270][T22932] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:34:56 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010477ca0a31573fc400925e4808", @ANYRES32, @ANYBLOB="0d01140016000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r1], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250824000000000000000a000000", @ANYRES32=r5, @ANYBLOB="001900000000000008000a0010"], 0x28}}, 0x0) 23:34:57 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) [ 2968.699746][T22941] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2968.847508][T22944] 8021q: adding VLAN 0 to HW filter on device team1 [ 2968.898766][T22944] team0: Port device team1 added [ 2968.921386][T22944] device team1 entered promiscuous mode [ 2968.958279][T22943] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2969.298159][T22936] loop4: detected capacity change from 0 to 32768 23:34:59 executing program 5: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000000c0), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f00000000c0)=0x5, 0x4) sendmmsg(r2, &(0x7f0000005440)=[{{0x0, 0xfffffffffffffcfb, 0x0}, 0xc000000}], 0xfb93a852dd518c, 0x101d0) 23:34:59 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:59 executing program 0: syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000000)=0x9774) 23:34:59 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x38, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_STA_CAPABILITY={0x6}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x5d9}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x38}}, 0x0) 23:34:59 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:34:59 executing program 4: syz_mount_image$btrfs(&(0x7f00000055c0), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f626172726965722c737562766f6c69643d2078303030303030303030726561642c73706163655f63766368653d76322c6175746f64006672616735f66e6f7370635f646562c9be6c6e610ad1ac3e5fa72dc1670a75672c73706163655f63616368653d76322c6e6f1a340c6ebf8dcacc7dca0173cc3ad2666d7573686f6e636f6d6d69742c7573656261636b7570726f6f742c64e1010044a750738473756d2c000a3df1f0db33d83fc69e931b3e1ff5634bb3d910c9f725db796714c65c9b67f4dfb78b62d0dce78e200a91c33cb1ff2daff8b725c007536eff8fdc00"/236], 0x1, 0x55a8, &(0x7f000000ac40)="$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") 23:34:59 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) [ 2970.718180][ T27] kauditd_printk_skb: 9 callbacks suppressed [ 2970.718198][ T27] audit: type=1804 audit(1689204899.128:3870): pid=22949 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2571/file0" dev="sda1" ino=1968 res=1 errno=0 [ 2970.760204][T22949] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:34:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000400)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BSSID={0xa, 0xf5, @random="c1628fce732e"}]}, 0x28}}, 0x0) [ 2970.874779][ T27] audit: type=1804 audit(1689204899.168:3871): pid=22954 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/980/file0" dev="sda1" ino=1973 res=1 errno=0 23:34:59 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:34:59 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) 23:34:59 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000380)) 23:34:59 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) [ 2971.084848][ T27] audit: type=1804 audit(1689204899.498:3872): pid=22964 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2572/file0" dev="sda1" ino=1964 res=1 errno=0 [ 2971.126638][T22964] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2971.150795][T22968] binder: BINDER_SET_CONTEXT_MGR already set [ 2971.161795][T22968] binder: 22965:22968 ioctl 4018620d 20000380 returned -16 [ 2971.272047][ T27] audit: type=1804 audit(1689204899.618:3873): pid=22970 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/981/file0" dev="sda1" ino=1977 res=1 errno=0 [ 2971.687054][T22951] loop4: detected capacity change from 0 to 32768 23:35:02 executing program 5: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140), 0x4300, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000080)=0x5) 23:35:02 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) 23:35:02 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:02 executing program 1: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$BINDER_GET_EXTENDED_ERROR(r0, 0x2, 0x0) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000180), 0x22182, 0x0) ioctl$SNDCTL_DSP_POST(r2, 0x5008, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000), 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_DRAIN(0xffffffffffffffff, 0x4144, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r2, 0x500e, 0x0) ioctl$SNDCTL_DSP_GETCAPS(r1, 0x8004500f, &(0x7f0000000140)) 23:35:02 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109"], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:02 executing program 4: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$SNDCTL_DSP_SETDUPLEX(r0, 0x5016, 0x0) 23:35:02 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000000)) [ 2973.872935][ T27] audit: type=1804 audit(1689204902.288:3874): pid=22979 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/982/file0" dev="sda1" ino=1968 res=1 errno=0 [ 2973.939891][T22978] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2973.955982][ T27] audit: type=1804 audit(1689204902.318:3875): pid=22978 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2573/file0" dev="sda1" ino=1973 res=1 errno=0 23:35:02 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109"], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:02 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\x103q}2[\xe0\x9a\xee\xaf\x03\x97\x9et\v\"|Ma\x86\xe7\xc0\x14\x9f\xb9h\xb1\x96\xe7=I\x860S6\xb5\xa8\xc2\x95Je%\xfeG\'e\xe5\x8f\xf8\xd2\x1c\xc0\xfb\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94k\xcd\t\x00\x90k\xd6\x05\xb6&\xd0\x9daA\xc5\x9c_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2Oc\xc0c\x03gB!\xb0\xb8n\x01\x9bT\x95\x10\x86\xe8$\x7f\r[\xf9\x0e1v\xb1\n\x88\v\x95uy\xb5:`\x8b\nC\x18A;\xaa%\xaf\xc7\xa3\xac\xa2D\xb5\xe2\xe1\xdc(\xfd\x05\x9fB\x84O\xfe@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\xa0\x17\xe3\xac\xe9\xc9\xa7\x8a\x1b\x03\"&\xac\xcap>\xccZ\x01\xbc\x18\xc1\xb9\xe9\v\x8b\x9c\xb4Q\xd4\x96EV<>\x99\xca\xb3\xe0\xc4tL\xed\xf5W\xbd#\xcf\x8a\x84\xed\x9f/\xd4\xbb\xea;-Dp\xf8\xd0F\x90\xf8\x92Ip6\xf4\x16\xe8\x14\xe0\x92!\x92-F\xe2\x14D\x91\xa8b\x04\xdd\x1d\a\xdc\xe0\x18\x85{\x80Q\xf6k\x96\xfaQ\x9fW\vO\xf0\xe4O\\\xceS\xf2\xde\x049d\x06#\x88\xc3\xdf\x85O\x1c\xc3\xad?r\xd7\x0e\x00\xd7\x83\xb0\x88\x9c\xf6Y-F\x98\xdd\x9c~\xfd\x95\xc3\xb6lC\xaa\"Y\xa2K\xecz\x84:*\xf5Y\xd1\x9b1\x91\x9b\x15\xd4\xec\x02o\x01&\xaa\x90w\xc4\xc7yn\xb5\x1ag\xab&?\xbe\xcb\xe8v\xa8\xe0\xa4\x81sW\xacf\x149\xd2}\xefCGa\x9a$4\x8c\xa5!p\x83\x05\x96%\x02%\xabj\n\b\xc8NC\x91}&y\xd3\xe1\xeep\'\xc5\xab\x19GsX5\x8c\n\x9fh\xee;4\xb1%V\xe0\xa9\x8e\xf30:\xd8\x18N~G\x139\xca', 0x2) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000007}) fcntl$addseals(r0, 0x409, 0xb) ioctl$PPPIOCGIDLE64(0xffffffffffffffff, 0x8010743f, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x20001) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:35:02 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000000)) 23:35:02 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:02 executing program 5: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000000, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r0 = socket(0x840000000002, 0x3, 0x100) connect$inet(r0, &(0x7f00000005c0)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005240)=[{{0x0, 0xa001800f, 0x0, 0x0, 0x0, 0x0, 0xffeb}, 0xfffffdef}], 0x4000095, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000003ec0), 0x40, 0x0) 23:35:02 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000000)) [ 2974.209216][ T27] audit: type=1804 audit(1689204902.618:3876): pid=22994 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2574/file0" dev="sda1" ino=1969 res=1 errno=0 23:35:02 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f00000001c0), 0x4) 23:35:02 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109"], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) [ 2974.278546][ T27] audit: type=1804 audit(1689204902.628:3877): pid=22993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/983/file0" dev="sda1" ino=1971 res=1 errno=0 [ 2974.316693][T22994] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 23:35:02 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) [ 2974.438814][ T27] audit: type=1804 audit(1689204902.848:3878): pid=23004 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/984/file0" dev="sda1" ino=1971 res=1 errno=0 23:35:02 executing program 0: syz_usb_connect(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902"], 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x400, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, 0x0) 23:35:03 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) [ 2974.582144][ T27] audit: type=1804 audit(1689204902.998:3879): pid=23009 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2575/file0" dev="sda1" ino=1943 res=1 errno=0 23:35:03 executing program 1: getpgid(0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x4080, 0x0) 23:35:03 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) [ 2974.902295][ T9269] usb 1-1: new high-speed USB device number 65 using dummy_hcd 23:35:03 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000), 0x20, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000040)={0x9}) 23:35:03 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$dsp(r0, &(0x7f0000000240)="16a14c3f8976f5aabce1b415de0e355bd2bffcc3e706d4f032866b99c3e7b5feb06d9f97ab3fec36f05104a9ea40c4dcbd8f13d0ebf4aeef0da6efd2c162c1292aa6e1d6647082680772f330619286b21b8ed1e7ff6133fc1f9fb51e0e0d61eff3492fcb10c135ccfa08a60df1e16165303bedf1f5dd56f76efd50b19865acdbb83c5e99fae99f12810b6ddb14a0023c27d07c2de6e1ca453d6915c26ccf3e829b80b5b4b07dc6fc924c496df77c98abc0bde2b1ecae7d3b54c7ac9b50f53fcbc66d67d58a6d1f738a43314e06736ca6e564ce88d8bfbec2a015d0240767f7a6040d73a3c0178637b775cc8ff942b47c79f9e3366ee20aadc7b5c148c579f16b74f685ab1e22ec8a4e1d658bb1181ab6549e4f0b76629ad005513df53e76c96e7c938817d38bf7756b05d9a9179ffbf0671a46758c965d193ba98996981158537721040215424d34ae90b74a831ec79f9d6faa81d345d5f330a3192179c77244baaaa0a98447b4b8992615b07627d60cfa8331d0c54588a3f09ee278fd94b0a0817a79e0bee82413741bf1508b09ac676e62c7b76ffbb81e3a66e8216bafcbb86edad6d51a870130e4af5758e4445352c3a0a25d3bdc05c96156db80538cf288f5d9a4d3f8b5098d87b0548f77e9cc31738cf7f22f812bc478815ae245602f71f95ff33a30e7447e0bf1d97ad61016c1c1db94cfa0989df9889d9ca271b13f0bccb06d42accdeeb07ef2d15840280df66ab99bde94d81f348d81e0c134e097495913a5f2301fe09256f677f169b0daed7ca591cc535ff0317c2365e884cb8ceaa50b61f0a93cc36fef7a229503ae60939e77dae8b000f31dc5614c82fb8022dd41eaae33f8c8ef92d5e5b8f830af224503b66e88b05937e73f04bfd9982c268679991bdc10b17b79f4f447ccb9c1716d2f954b64d56dd731b964edb2b34d32d70e50382b27f263c0902e9749b3f162e64640c2d5374e8321cf9acd65664533479bf36cb21f70a8ffd10764cc62b4f123c3e2cb9ab14ead778bd862ecf423c4856ed126f2dbcf94adcfe55c6e83479d5742768cda1cfb2c81e821b345491593b242778f444c66942f45d20a941f095d00c8af6159f02a0843772a8d214d80f3d364d18e264bb44ba978bfcfe635a1867cae289b7db1efe281a7261b7e586056defaef4852e3d997a8a649b35f2a384806e38841cfd2b4ea8b25b1c2e80ff41ad4892322f80a9c8b413a2aedfe9b1536767c90f625959298f5e312dbf66ef91e9ed88cce4213a7cea3ec18add779931c8ea0c00fa7726dcbb6237e8be0de1114e88f349760a722a186c271ae71d07becd047b8d20c71fde59463a94f101026351c91e7e9471deb061c47e54b438d3d522dcaccc332f7a714999eb38061611355739d3dc38a83d56122937c29edf5a18a33e7358895ed94edce13b807c71d4e000b31184ca6611d2b11313f7a98899d675753e4d4cb21512ff58620525d20129252da6c835a0ff9b890f3ccba040b1ab267605cc4bea77778c42bd2a11547641380dba262cc64f66dee7281a0f18f6f2217b98ebee9ea80d31f4543eb25106a4415b651caee9dc164687df60903111ceb848e2502b7d129d118c31bec21de325f908a228326457625efec5a0344a748e79a436a5821a204d94bc7520132a3057ec19902b0b9e436ddbb3045148e8f3ea5b360691c48619b4066e80ff4a9f1f2582ebaf6eccad56190ba7a1ca180c0336b39d3006f9aa055d3452107bee370b3c3ccc7e5a9d3e47321088ee6803a23d2818408e9a298f85a071b86812edc3a277898842061b08751547dfcab02bab97f35474cf4ee83f5e53ffbacfea5e0debde4024ac096f33cc95101fdeaedb51212355534a60734a8bd71436855b8af28d09f2039864e9f8d3b2448aa8741245ce4bb55f7677c7ec89178550f26c6e9062321648e49d30b507eb018f250d80b2f6d6a0cc418abba19a504dc930a18578305ef4f561d4c4e6c1dd34ad8920121c365ae0db8269f351627f7cd1507d95ca4fd27e18a8cbc3cfb39ac80947ab12b6bec0b624adad2836dcec1036cf32e2383aa122ed6826226e5ecdd7b91d50e8fbf2869d5bfb01b825d6e5674cc55130f79dfd144c5a14382426ff9bf5ecedf37778c41648cd78c1c41b029448719c75e4c38bb10b99f494aba9ae0ca8c35f2ff5827f7c051562cd2ae6de6b8274cbb13e1ef9cc72e363b0b6ffc0187e0f742321d30ebaecf0ef28e9b5063efb47e4c4fc86785d392f8318a090adf04bf9143ae50b2048755c21c3c337a0a3801b14f5f735defed6d440ede9cf3a3a99589be50876e7a75496314f45d8074363944aef91ec1c044794772bab4d135f8a84d0e2472356c4fac1adbf3c5e5e1fe1c7aa74985d6e68ab01af3042b84166a4eb6f968ccc714e0704975a6bcce59f2c3809fc295af01c2b315c96f44d2373efa75f63f406e2fa154d9393350b705a0967df6ecc11eb8f3f742d760f8835d43ced099ba58607915ae1ec3e5871bbbc0125f00823df54eda663c9171521f6b5a8a9ba8569df1eb1b7ad6e8abe5fb01c9da81dfe4f2b156b2b63d2102333e2860d4c8cc7c464c2870c89dd0dc604242238e9fdab2e6e1fcb39479e1d701bc58f1d634b86f2149ec8ebc359029e511256686ee6e7ed6c94b88a7b673a48d88f806e3036c08dea9a43ce15bc704c3dcee4fa83b699d0d6b71c535df5650beae81712027fac10b5316f5eb807c1b7826159e4e61fd37f41255a6d6fab9692fe92d8b855e9e042d412bdef22c99bb96a4da259014a0008bee2ba3294354c5256ce74b439b8bce2f00bbc5db5fd0e21449aecb4913cd79442fbe85bea027a6512301dd33989eba526f2b701a9777ee88f050734ba82d3eb77f4204a26a5abe1f339b4f3ac38b6c6e485898b539bffe3f1422d74db8be2b01af1fc29edcfdcd97c276929ee8109e0d5b861563d1bf7e708ab2f5b6e8d8465b1890ee110b20124c5a02a0f16ed7523f2846898b219523872b00df0b9d9304a8dd5aa62d067f4bc3c6dbb29b78edc6a6ce899cded489211173401f539f164df87b71d3721d673700c563cf46ea6e87cef91a40d3276ef2a0219e35ef6d76c2289126a9ed1c0b8525572ad42f910f4de9f899ab69f236ede439222e3dd4bd12621d2f9922010a36ae394e6faf4f65276e066374063e38b14599a32090f195aa8ff045340d4e1984b44a42571958373fafb17f6ba09993ec8b33211e57dbe1249038fadb8b0d9ba3729f5a9e294411f905cc5fb34d1810178d78265ecfd985201b6f0b0cad7ea804d177521d4d44f7fe9a3050749bd8104d849d630c1094d4d1bcc54f7d583b32b801cdcd81c54fa330a7d52d3e0cd4f0a72d071a1400f2f014478d02acc51c92e742f2868a7bb3f430f594f9d47c15b16446c48fb5337b5ddf77fc803fd900d6bd6039d415e71f1b5c9a21eb397042f9c87942e8f26e219d5468caadafbab5ff70aef913756aa8dd980c151fe3de7d45f0964bbeb1c29d10e61635804061dc96c475dc400532a9dd9cbc075910f5e905ce129d89f6ab19ec7393dfcb98545d8ff660c70bc3478ab2a0fda6e530b5896991aac9e890b8168f2b51045755655a03c3d6b8bea77cf6df0f66bb16ec0825c832474cc5ebb3c9459ce7316f89f6a1de368474c469fa5ba8b521d635e66b7d61bd4d7f429c301abe3b2e59b60f14c37e6270857a96a5af4e2741e8366914cf29bba85240182af38e5aafe9d9d0a967930fdbc85655d88b5e5f5da025b8e6851bd2fb64c9d44339dff5e0155697b179e34927bd572d9d44196a3bfe12e310997e4647132e8afdbf6577742b0ffd45915546227ce3da604573dc7cae5338d04fd8869cafd91e12fdac857566bb4de95dc909b672fd5a29b064b6b49fd25f15ebfea737b6fc93a448f7d6172edacc2e5c210693766cd0e119a0ba6cae209fc0c34f2f18fffcfb31be4ddb32244fd24cc00f8fe9d59e1822c8637924ebafc1489c47e7fdf8e7fc7c3909422c955538ed135b776b96bc743a19f0b3a34ba676c82e5324cf2795555a8f0537a6660b43348502150890d65bf4685a6decaec456a8a8b0099592a4d27186d3df5f3cc4c277b0739c5a03f16a5d3bec93270f9c27e8ba7e20880127262f5eac79cf68add3378e89ec494e8217183a387a253189f270c2c667e68aca67c27216d6308a7b6a1f435180141594f4daa0f00d4da26a1cd23538824d3d91e4cc515abb6a7f5b195463371b78223a54d2062ea2196f3a37629ac210cd452731d58690dcb334dfab60eba85fe10ccbe4b3c0a591f703674b0e27249b487b69daf17f6e0985195dda54bf34fe292b7467a30e565af052072e5092b1a6daa88761b633ae7aaea52c119ede61bdc33efe19a559d5c54986a64a22f2e16e14f58c678e268c84936fe4fad35725b3ebdbebdde00d3002de8b96c0cd9e16addff0208f718393ac7244042ab0ab6b86c2543920c951953a9b7628cde740e3bbe81feea533a2d8d4c5969993c9c6f003954c6b2281d714ce50054f1851984bd76c8beab232d67666d3dc409db6ee2437ed61216f16119957bf66f4903a48fef9d3552ebfe768fba0f7277213846545134ba49269702bb0b75c9038419e6f35328042f77d8eb1fb0eb87007ecb045e3e9cd2572c575eff1cbdac518f045df32f0720f96c9a419381abc0700acdc636d47172c55c920655bebb8d9522e2a2d45d0ae034a86645093ccc0ac9ff08c199c6718d702b0111ae9621a800541fc9c869973c0d1a3629c30edf42352d4a643f975e480c56e812ee0f932b40ea4be23873db3e7d61c9b2de863272d5ee381dc2d00837d094357d4fcb89721054cc7f793697fa950b559d294c2cff0af16e042b74f51a59428be24567b1f6b0d61c21ceac02a2aa1c5b2860fba345b48849e53ae536742e6de1a8c4463159832e94666f7b9c9913393f6eaf0f99483296c41ade558fdc4bf8cfad4fc22af934e5acd0286cd1573cac1c81da57f2009636fd0285c7e8102590fb8c62c213f426377ae77adc974978c34388bc62156552f3733965f46060704706a942685bc2623d2e215e6bb84a810221b7a20c56b14f2a6916149bef3e9571d8d92f3ad3bfbe3028a4e2a69ad4009d837a1f69c97f92c652ca5fc67a53fa48564072d27f05b6e60fccbde41f04d5bb6edef3865138f8f6364f222b069274e792af188d9b52e5cae76328207a80adebf76054faa5dc333a32a28b556a77dc3f50f2e98dd48753ad109c2b1cb44de0c224e4aa8eaea0366e0b9e7d0d59b150782d3e389ed46cb1c1522b5018d4488d25862ae39b6a719c2e294b1edba0d02b1fde58b258b70bc5110ac2468cd78eb69f32ed2a9c1b949271721bd061b1a80954b99ddebf5847022b5071bffc80a6cb58be62e2dfffd7fe01966d2ae9b2b9606a346d1e385874be669803290329c34c6ecd966341dac2f39a7382729315f1612804dcb327c55a3559116c794c900ea67e6cf88a1ab1e43e794486e38f78f1f067fc8286dd061afe971445e966e773c09489e9c21ea2ef1084ac46912f66e46177c1c49dbf03f65bdb991aac3d1b3b4adb3cabebe4885541ee8c8129a9bdfabbbf0da5f68692b63043040b1c12817792125923f1b8c019a49e1150237954c094c8d512f43db9ef8a82404402583bd7132a2afbb46b01ba4ae9ef150b5840b4ecb292d5e67d1d8ad6589da281b6c635db70bcf794df47c1fd331536373ba720c142718854dc82cc6aae9340b7e3045bc4648d2a8971f51cdf4c0", 0x1000) 23:35:03 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:03 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109"], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:03 executing program 5: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000000, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r0 = socket(0x840000000002, 0x3, 0x100) connect$inet(r0, &(0x7f00000005c0)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005240)=[{{0x0, 0xa001800f, 0x0, 0x0, 0x0, 0x0, 0xffeb}, 0xfffffdef}], 0x4000095, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000003ec0), 0x40, 0x0) [ 2975.181779][ T9269] usb 1-1: Using ep0 maxpacket: 8 23:35:03 executing program 4: syz_open_dev$video(&(0x7f00000000c0), 0x10001, 0x4000) 23:35:03 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) [ 2975.312263][ T9269] usb 1-1: config 0 has no interfaces? [ 2975.318022][ T9269] usb 1-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 2975.346741][ T9269] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 23:35:03 executing program 4: syz_clone(0x4808c200, &(0x7f0000000140), 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="68eacea5b76c2e0907aa855b6bda70241566ce6c420145f463fb8122cffd81aacf105c7eaf317e6d963610e44d9608e6eca8a3d74872801760c652f2939a9904f9c6b57270a5ec2c187c2b") openat$vsock(0xffffffffffffff9c, &(0x7f0000000240), 0x4a080, 0x0) [ 2975.358563][ T9269] usb 1-1: config 0 descriptor?? [ 2975.628359][T13750] usb 1-1: USB disconnect, device number 65 23:35:04 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:04 executing program 0: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000100)=0x40) 23:35:04 executing program 5: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_QUERYBUF_DMABUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x2, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "35f77457"}}) 23:35:04 executing program 1: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x8c400, 0x0) 23:35:04 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109"], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:04 executing program 5: syz_clone(0x4808c200, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2976.207149][ T27] kauditd_printk_skb: 5 callbacks suppressed [ 2976.207167][ T27] audit: type=1804 audit(1689204904.618:3885): pid=23041 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2578/file0" dev="sda1" ino=1967 res=1 errno=0 [ 2976.296782][ T27] audit: type=1804 audit(1689204904.668:3886): pid=23045 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/988/file0" dev="sda1" ino=1956 res=1 errno=0 23:35:04 executing program 4: syz_clone(0x4808c200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)) 23:35:04 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(r0, 0x40084149, &(0x7f0000000080)) 23:35:04 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109"], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:04 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:04 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r0, 0xc04064aa, &(0x7f0000000200)={0x0, 0x0}) 23:35:05 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_QUERYBUF_DMABUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0xe, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "702b12b5"}}) [ 2976.556266][ T27] audit: type=1804 audit(1689204904.968:3887): pid=23056 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2579/file0" dev="sda1" ino=1966 res=1 errno=0 23:35:05 executing program 0: syz_clone(0xa0025b00, 0x0, 0x0, 0x0, 0x0, 0x0) 23:35:05 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) [ 2976.678000][ T27] audit: type=1804 audit(1689204904.998:3888): pid=23061 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/989/file0" dev="sda1" ino=1980 res=1 errno=0 23:35:05 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:05 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_QUERYBUF_DMABUF(r0, 0xc0585609, &(0x7f0000000100)={0x0, 0x1, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a1b75613"}}) 23:35:05 executing program 0: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$SNDCTL_DSP_SUBDIVIDE(r0, 0xc0045009, &(0x7f0000000040)=0x8) [ 2976.821313][ T27] audit: type=1804 audit(1689204905.228:3889): pid=23068 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2580/file0" dev="sda1" ino=1961 res=1 errno=0 [ 2976.916470][ T27] audit: type=1804 audit(1689204905.268:3890): pid=23070 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/990/file0" dev="sda1" ino=1963 res=1 errno=0 23:35:05 executing program 5: syz_clone(0x4808c200, 0x0, 0x0, 0x0, 0x0, 0x0) 23:35:05 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB, @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:05 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:05 executing program 1: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f00000010c0), 0x1, 0x0) ioctl$SNDCTL_DSP_GETCAPS(r0, 0x8004500f, &(0x7f0000000040)) 23:35:05 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0x54, 0x0, &(0x7f0000000180)=[@enter_looper, @register_looper, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 23:35:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), 0x4) 23:35:05 executing program 0: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010477ca0a31573fc400925e4808", @ANYRES32, @ANYBLOB="0d01140016000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r1], 0x48}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800000000000000001f000000", @ANYRES32=r5, @ANYBLOB="001900000000000008000a0010"], 0x28}}, 0x0) [ 2977.269630][ T27] audit: type=1804 audit(1689204905.678:3891): pid=23083 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2581/file0" dev="sda1" ino=1972 res=1 errno=0 [ 2977.379878][ T27] audit: type=1804 audit(1689204905.678:3892): pid=23081 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/991/file0" dev="sda1" ino=1973 res=1 errno=0 23:35:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = dup(r3) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) 23:35:05 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB, @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:05 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:05 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000), 0x8, 0x0) ioctl$VIDIOC_QUERYBUF_DMABUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "50bd1a91"}}) [ 2977.519826][T23089] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2977.583748][T23093] 8021q: adding VLAN 0 to HW filter on device team1 [ 2977.599363][T23093] team0: Port device team1 added [ 2977.624541][ T27] audit: type=1804 audit(1689204906.038:3893): pid=23098 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/992/file0" dev="sda1" ino=1972 res=1 errno=0 [ 2977.656438][T23093] device team1 entered promiscuous mode 23:35:06 executing program 1: r0 = syz_open_dev$vivid(&(0x7f0000000000), 0x0, 0x2) ioctl$VIDIOC_QUERYBUF_DMABUF(r0, 0xc0585609, &(0x7f0000000100)={0x0, 0x7, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "acbe94fd"}}) [ 2977.722358][ T27] audit: type=1804 audit(1689204906.038:3894): pid=23101 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2582/file0" dev="sda1" ino=1973 res=1 errno=0 23:35:06 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "97ec3cc2fa47c1cc9adafbe8ed12a82b9afe33693a8f177b84e011e12a1821c262f023c221388e80c0bab22b21104590062ebd2604fe016cebd0e501d25bdca9"}, 0x48, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000080)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0) 23:35:06 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0xc0285628, &(0x7f0000000080)) 23:35:06 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000000c0)={r1, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, "56451063f76d26d4466017943325e9b2db3d4fa022a73629d2173bfc8abbc75c873f6b58d54fe94d7b05a29cac0215f159440f83f885b0a8dff95c32b74c2a09", "aa9ce18774842e79737860b3fc59e06f69eb710313e1e53506fb20dd016c7546067913f59d997e5fd7dd90ae952e5f7da7ab2a3f6e8ebbdc168a8a9279e9f195", "48338c81f97c4b61221219c71c0b3087cbcc28ba89f6abc967747600c1f73a75"}}) 23:35:06 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB, @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:06 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) fcntl$setown(r0, 0x40a, 0x0) 23:35:06 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:06 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0xc0285628, &(0x7f0000000080)) 23:35:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x1265, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "56451063f76d26d4466017943325e9b2db3d4fa022a73629d2173bfc8abbc75c873f6b58d54fe94d7b05a29cac0215f159440f83f885b0a8dff95c32b74c2a09", "aa9ce18774842e79737860b3fc59e06f69eb710313e1e53506fb20dd016c7546067913f59d997e5fd7dd90ae952e5f7da7ab2a3f6e8ebbdc168a8a9279e9f195", "48338c81f97c4b61221219c71c0b3087cbcc28ba89f6abc967747600c1f73a75"}}) 23:35:07 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000001280)={{0x12, 0x1, 0x0, 0xf7, 0xe7, 0x80, 0x40, 0x13d3, 0x3333, 0xfcef, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x24, 0x6a, 0x9}}]}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:07 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:07 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:07 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000073c0), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f00000000c0)={0x0, {'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000080)=""/19, 0x13}}, 0x120) write$UHID_INPUT(r0, &(0x7f0000000c80)={0xc, {"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", 0x1000}}, 0x1006) [ 2978.716551][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 23:35:07 executing program 5: r0 = io_uring_setup(0x7027, &(0x7f0000000500)) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0x4, &(0x7f0000000040)=[@ioring_restriction_sqe_flags_allowed={0x7}], 0x1) 23:35:07 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0xc0285628, &(0x7f0000000080)) [ 2978.761681][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 2978.769145][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 23:35:07 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) [ 2978.835076][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 23:35:07 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:07 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0xc0285628, &(0x7f0000000080)) [ 2978.892712][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 2978.911713][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 2978.919167][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 23:35:07 executing program 0: ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0xc0285628, &(0x7f0000000080)) [ 2978.991804][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 2979.023408][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 2979.030865][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 2979.061734][T22514] usb 5-1: new high-speed USB device number 123 using dummy_hcd [ 2979.071701][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 23:35:07 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$nfc_llcp(r0, 0x10e, 0x0, 0x0, 0xb011fcf77f0000) [ 2979.122548][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 2979.131175][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 2979.168400][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 2979.217318][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 2979.241707][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 2979.249175][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 2979.291718][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 2979.299229][ T4596] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 2979.349782][ T4596] hid-generic 0000:0000:0000.0010: hidraw0: HID v0.00 Device [syz1] on syz0 [ 2979.489232][T22514] usb 5-1: New USB device found, idVendor=13d3, idProduct=3333, bcdDevice=fc.ef [ 2979.502923][T22514] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2979.523584][T22514] usb 5-1: config 0 descriptor?? [ 2979.575606][T22514] r8712u: register rtl8712_netdev_ops to netdev_ops [ 2979.587019][T22514] usb 5-1: r8712u: USB_SPEED_HIGH with 0 endpoints [ 2980.012055][T22514] usb 5-1: r8712u: Boot from EFUSE: Autoload Failed [ 2980.020102][T22514] usb 5-1: r8712u: MAC Address from efuse = 00:e0:4c:87:00:00 [ 2980.037242][T22514] usb 5-1: r8712u: Loading firmware from "rtlwifi/rtl8712u.bin" [ 2980.214570][ T9269] usb 5-1: USB disconnect, device number 123 23:35:09 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000001280)={{0x12, 0x1, 0x0, 0xf7, 0xe7, 0x80, 0x40, 0x13d3, 0x3333, 0xfcef, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x24, 0x6a, 0x9}}]}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:09 executing program 0: ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0xc0285628, &(0x7f0000000080)) 23:35:09 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB, @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:09 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a6", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:09 executing program 5: r0 = io_uring_setup(0x2, &(0x7f0000000000)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x8000000) 23:35:09 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$clear(0x7, r0) 23:35:09 executing program 0: ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0xc0285628, &(0x7f0000000080)) 23:35:09 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) fcntl$setown(r0, 0x2, 0x0) 23:35:09 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0xc0285628, &(0x7f0000000080)) 23:35:09 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a6", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:09 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB, @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:09 executing program 1: r0 = io_uring_setup(0x3, &(0x7f0000000080)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) [ 2981.181738][ T9269] usb 5-1: new high-speed USB device number 124 using dummy_hcd [ 2981.234768][ T27] kauditd_printk_skb: 9 callbacks suppressed [ 2981.234803][ T27] audit: type=1804 audit(1689204909.648:3904): pid=23185 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2587/file0" dev="sda1" ino=1969 res=1 errno=0 [ 2981.363535][ T27] audit: type=1804 audit(1689204909.648:3905): pid=23187 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/998/file0" dev="sda1" ino=1977 res=1 errno=0 [ 2981.592188][ T9269] usb 5-1: New USB device found, idVendor=13d3, idProduct=3333, bcdDevice=fc.ef [ 2981.609278][ T9269] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2981.638332][ T9269] usb 5-1: config 0 descriptor?? [ 2981.701428][ T9269] r8712u: register rtl8712_netdev_ops to netdev_ops [ 2981.717830][ T9269] usb 5-1: r8712u: USB_SPEED_HIGH with 0 endpoints [ 2982.134015][ T9269] usb 5-1: r8712u: Boot from EFUSE: Autoload Failed [ 2982.140649][ T9269] usb 5-1: r8712u: MAC Address from efuse = 00:e0:4c:87:00:00 [ 2982.153958][ T9269] usb 5-1: r8712u: Loading firmware from "rtlwifi/rtl8712u.bin" [ 2982.362386][T22516] usb 5-1: USB disconnect, device number 124 23:35:11 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0xc0285628, &(0x7f0000000080)) 23:35:11 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_START_REQ(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x14, r2, 0x1, 0x0, 0x0, {0x28}}, 0x14}}, 0x0) 23:35:11 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_START_REQ(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_CHANNEL={0x5, 0x5}]}, 0x1c}}, 0x0) 23:35:11 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a6", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:11 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000001280)={{0x12, 0x1, 0x0, 0xf7, 0xe7, 0x80, 0x40, 0x13d3, 0x3333, 0xfcef, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x24, 0x6a, 0x9}}]}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:11 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB, @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:11 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0xc0285628, &(0x7f0000000080)) [ 2982.983756][ T27] audit: type=1804 audit(1689204911.398:3906): pid=23233 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2588/file0" dev="sda1" ino=1959 res=1 errno=0 [ 2983.001845][T23234] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 2983.088752][ T27] audit: type=1804 audit(1689204911.498:3907): pid=23242 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/999/file0" dev="sda1" ino=1977 res=1 errno=0 23:35:11 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0xb, r1, 0x0) 23:35:11 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:11 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000200)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x0, "4a04b5c36e801a6a12d9b6ef60936cb56fa7f6c8d42d8d2e1b60fc69fb81f973c3aeea7faa387010ddfbed8b2d058924c5df43afc41adcf79852b7242847edf5", "5845c12afbbc5f2e93472f6351ba25793c714d9005269919865f634f1c8dee48"}) 23:35:11 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0xc0285628, &(0x7f0000000080)) 23:35:11 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b69", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:11 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_START_REQ(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x29, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_COORD={0x4}, @IEEE802154_ATTR_CHANNEL={0x5}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6}, @IEEE802154_ATTR_PAN_COORD={0x5}]}, 0x34}}, 0x0) [ 2983.311796][T22516] usb 5-1: new high-speed USB device number 125 using dummy_hcd 23:35:11 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0xc0285628, &(0x7f0000000080)) 23:35:11 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) fcntl$setown(r0, 0x25, 0x0) [ 2983.367514][ T27] audit: type=1804 audit(1689204911.778:3908): pid=23251 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2589/file0" dev="sda1" ino=1954 res=1 errno=0 [ 2983.478468][ T27] audit: type=1804 audit(1689204911.828:3909): pid=23256 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1000/file0" dev="sda1" ino=1969 res=1 errno=0 [ 2983.488150][T23259] netlink: 'syz-executor.5': attribute type 25 has an invalid length. 23:35:12 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_START_REQ(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x14, r2, 0x1, 0x0, 0x0, {0x22}}, 0x14}}, 0x0) [ 2983.682163][T22516] usb 5-1: New USB device found, idVendor=13d3, idProduct=3333, bcdDevice=fc.ef [ 2983.691271][T22516] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2983.730411][T22516] usb 5-1: config 0 descriptor?? [ 2983.804202][T22516] r8712u: register rtl8712_netdev_ops to netdev_ops [ 2983.813734][T22516] usb 5-1: r8712u: USB_SPEED_HIGH with 0 endpoints [ 2984.232022][T22516] usb 5-1: r8712u: Boot from EFUSE: Autoload Failed [ 2984.238674][T22516] usb 5-1: r8712u: MAC Address from efuse = 00:e0:4c:87:00:00 [ 2984.253776][T22516] usb 5-1: r8712u: Loading firmware from "rtlwifi/rtl8712u.bin" [ 2984.440341][T22516] usb 5-1: USB disconnect, device number 125 23:35:13 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0xc0285628, &(0x7f0000000080)) 23:35:13 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:13 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b69", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:13 executing program 5: syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x220840) r0 = io_uring_setup(0x7027, &(0x7f0000000500)) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0x2, &(0x7f0000000040)=[@ioring_restriction_sqe_flags_required], 0x2) 23:35:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x40101286, 0xffffffffffffffff) 23:35:13 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000001280)={{0x12, 0x1, 0x0, 0xf7, 0xe7, 0x80, 0x40, 0x13d3, 0x3333, 0xfcef, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x24, 0x6a, 0x9}}]}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x125d, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "56451063f76d26d4466017943325e9b2db3d4fa022a73629d2173bfc8abbc75c873f6b58d54fe94d7b05a29cac0215f159440f83f885b0a8dff95c32b74c2a09", "aa9ce18774842e79737860b3fc59e06f69eb710313e1e53506fb20dd016c7546067913f59d997e5fd7dd90ae952e5f7da7ab2a3f6e8ebbdc168a8a9279e9f195", "48338c81f97c4b61221219c71c0b3087cbcc28ba89f6abc967747600c1f73a75"}}) 23:35:13 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0xc0285628, 0x0) 23:35:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sys_enter\x00', r0}, 0x10) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2985.111435][ T27] audit: type=1804 audit(1689204913.518:3910): pid=23301 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2590/file0" dev="sda1" ino=1976 res=1 errno=0 [ 2985.190605][ T27] audit: type=1804 audit(1689204913.528:3911): pid=23302 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1001/file0" dev="sda1" ino=1977 res=1 errno=0 23:35:13 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b69", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:13 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0), 0x80080000, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 23:35:13 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0xc0285628, 0x0) 23:35:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_START_REQ(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x29, r2, 0x1, 0x0, 0x8000000, {}, [@IEEE802154_ATTR_PAN_COORD={0x5}, @IEEE802154_ATTR_CHANNEL={0x4}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6}, @IEEE802154_ATTR_PAN_COORD={0x5, 0x19, 0x68}]}, 0x34}}, 0x0) [ 2985.351877][ T6086] usb 5-1: new high-speed USB device number 126 using dummy_hcd 23:35:13 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:13 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0xc0285628, 0x0) [ 2985.408452][ T27] audit: type=1804 audit(1689204913.818:3912): pid=23315 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1002/file0" dev="sda1" ino=1952 res=1 errno=0 23:35:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x19, {0xa1ffffff}}}}, 0x30}}, 0x0) [ 2985.494029][T23321] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 23:35:13 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ec", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) [ 2985.544941][ T27] audit: type=1804 audit(1689204913.958:3913): pid=23325 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2591/file0" dev="sda1" ino=1973 res=1 errno=0 [ 2985.741783][ T6086] usb 5-1: New USB device found, idVendor=13d3, idProduct=3333, bcdDevice=fc.ef [ 2985.750965][ T6086] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2985.762556][ T6086] usb 5-1: config 0 descriptor?? [ 2985.814892][ T6086] r8712u: register rtl8712_netdev_ops to netdev_ops [ 2985.821908][ T6086] usb 5-1: r8712u: USB_SPEED_HIGH with 0 endpoints [ 2986.231858][ T6086] usb 5-1: r8712u: Boot from EFUSE: Autoload Failed [ 2986.238724][ T6086] usb 5-1: r8712u: MAC Address from efuse = 00:e0:4c:87:00:00 [ 2986.251285][ T6086] usb 5-1: r8712u: Loading firmware from "rtlwifi/rtl8712u.bin" [ 2986.439937][ T6086] usb 5-1: USB disconnect, device number 126 23:35:15 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000001280)={{0x12, 0x1, 0x0, 0xf7, 0xe7, 0x80, 0x40, 0x13d3, 0x3333, 0xfcef, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x24, 0x6a, 0x9}}]}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) 23:35:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@typedef={0x2}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000100)=""/130, 0x28, 0x82, 0x1}, 0x20) 23:35:15 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ec", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x125d, 0xffffffffffffffff) 23:35:15 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x1279, r0) 23:35:15 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a6", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r1, 0x1, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @media='eth\x00'}}}}, 0x68}}, 0x0) 23:35:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x9, r0, 0xfffffffffffffffb) 23:35:15 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000100)='asymmetric\x00', 0x0, 0x0, 0x0, r1) [ 2987.060435][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 2987.060453][ T27] audit: type=1804 audit(1689204915.468:3915): pid=23365 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1004/file0" dev="sda1" ino=1972 res=1 errno=0 23:35:15 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a6", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) [ 2987.205746][ T27] audit: type=1804 audit(1689204915.488:3916): pid=23364 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2592/file0" dev="sda1" ino=1973 res=1 errno=0 23:35:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x5452, 0xffffffffffffffff) 23:35:15 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x80202, 0x0) write$nbd(r0, &(0x7f0000000240)={0x67446698, 0x0, 0x0, 0x0, 0x0, "ff098acdcbb33627bc09a06d4fd155606e34f750ecddc0d2dc96a1eeb081b5cd0e0e93e28ecbbb431c6821c8f2eacf324bb198e1ede1bf3f265a50715946ac4d"}, 0x50) [ 2987.367344][ T27] audit: type=1804 audit(1689204915.778:3917): pid=23382 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2593/file0" dev="sda1" ino=1964 res=1 errno=0 [ 2987.396115][T22514] usb 5-1: new high-speed USB device number 127 using dummy_hcd [ 2987.791842][T22514] usb 5-1: New USB device found, idVendor=13d3, idProduct=3333, bcdDevice=fc.ef [ 2987.801114][T22514] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2987.818223][T22514] usb 5-1: config 0 descriptor?? [ 2987.866066][T22514] r8712u: register rtl8712_netdev_ops to netdev_ops [ 2987.873057][T22514] usb 5-1: r8712u: USB_SPEED_HIGH with 0 endpoints [ 2988.291731][T22514] usb 5-1: r8712u: Boot from EFUSE: Autoload Failed [ 2988.298377][T22514] usb 5-1: r8712u: MAC Address from efuse = 00:e0:4c:87:00:00 [ 2988.312415][T22514] usb 5-1: r8712u: Loading firmware from "rtlwifi/rtl8712u.bin" [ 2988.323201][T22514] usb 5-1: USB disconnect, device number 127 23:35:17 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000001280)={{0x12, 0x1, 0x0, 0xf7, 0xe7, 0x80, 0x40, 0x13d3, 0x3333, 0xfcef, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x24, 0x6a, 0x9}}]}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) 23:35:17 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ec", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x1265, 0x0) 23:35:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x5452, 0xffffffffffffffff) 23:35:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x9, r0, 0xfffffffffffffffb) 23:35:17 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a6", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:17 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r0, 0x614b13e7e4714025, 0x70bd28, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc4}, 0x800) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x40) sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4002000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa0, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6, 0x4, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}]}, 0xa0}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r3) sendmsg$IEEE802154_START_REQ(r1, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x29, r4, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_COORD={0x5}, @IEEE802154_ATTR_CHANNEL={0x5}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6}, @IEEE802154_ATTR_PAN_COORD={0x5}]}, 0x34}}, 0x0) [ 2988.850685][ T27] audit: type=1804 audit(1689204917.258:3918): pid=23388 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2594/file0" dev="sda1" ino=1959 res=1 errno=0 23:35:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x5452, 0xffffffffffffffff) 23:35:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x1265, 0x0) [ 2988.948307][ T27] audit: type=1804 audit(1689204917.308:3919): pid=23390 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1005/file0" dev="sda1" ino=1973 res=1 errno=0 23:35:17 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b69", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:17 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x1265, 0x0) [ 2989.041117][T23401] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2989.121994][ T27] audit: type=1804 audit(1689204917.538:3920): pid=23405 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2595/file0" dev="sda1" ino=1951 res=1 errno=0 [ 2989.141790][T22515] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 2989.204615][ T27] audit: type=1804 audit(1689204917.598:3921): pid=23407 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1006/file0" dev="sda1" ino=1961 res=1 errno=0 [ 2989.531801][T22515] usb 5-1: New USB device found, idVendor=13d3, idProduct=3333, bcdDevice=fc.ef [ 2989.541033][T22515] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2989.558160][T22515] usb 5-1: config 0 descriptor?? [ 2989.614568][T22515] r8712u: register rtl8712_netdev_ops to netdev_ops [ 2989.621332][T22515] usb 5-1: r8712u: USB_SPEED_HIGH with 0 endpoints [ 2990.031910][T22515] usb 5-1: r8712u: Boot from EFUSE: Autoload Failed [ 2990.038621][T22515] usb 5-1: r8712u: MAC Address from efuse = 00:e0:4c:87:00:00 [ 2990.046439][T22515] usb 5-1: r8712u: Loading firmware from "rtlwifi/rtl8712u.bin" [ 2990.057514][T22515] usb 5-1: USB disconnect, device number 2 23:35:18 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000001280)={{0x12, 0x1, 0x0, 0xf7, 0xe7, 0x80, 0x40, 0x13d3, 0x3333, 0xfcef, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x24, 0x6a, 0x9}}]}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) 23:35:18 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x1265, 0x0) 23:35:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x5452, 0xffffffffffffffff) 23:35:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x4, 0x1, 0x301}, 0x14}}, 0x0) 23:35:18 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:18 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b69", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:19 executing program 1: ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x1265, 0x0) [ 2990.596216][ T27] audit: type=1804 audit(1689204919.008:3922): pid=23413 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1007/file0" dev="sda1" ino=1964 res=1 errno=0 23:35:19 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x3, r1, 0x0) 23:35:19 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) fcntl$setown(r0, 0x40e, 0x0) 23:35:19 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:19 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b69", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) [ 2990.706188][ T27] audit: type=1804 audit(1689204919.008:3923): pid=23417 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2596/file0" dev="sda1" ino=1972 res=1 errno=0 23:35:19 executing program 1: ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x1265, 0x0) [ 2990.855376][ T27] audit: type=1804 audit(1689204919.258:3924): pid=23429 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1008/file0" dev="sda1" ino=1976 res=1 errno=0 [ 2990.922440][T22516] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 2991.322359][T22516] usb 5-1: New USB device found, idVendor=13d3, idProduct=3333, bcdDevice=fc.ef [ 2991.331428][T22516] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2991.341405][T22516] usb 5-1: config 0 descriptor?? [ 2991.404930][T22516] r8712u: register rtl8712_netdev_ops to netdev_ops [ 2991.411938][T22516] usb 5-1: r8712u: USB_SPEED_HIGH with 0 endpoints [ 2991.841822][T22516] usb 5-1: r8712u: Boot from EFUSE: Autoload Failed [ 2991.848451][T22516] usb 5-1: r8712u: MAC Address from efuse = 00:e0:4c:87:00:00 [ 2991.856783][T22516] usb 5-1: r8712u: Loading firmware from "rtlwifi/rtl8712u.bin" [ 2991.867380][T22516] usb 5-1: USB disconnect, device number 3 23:35:20 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000001280)={{0x12, 0x1, 0x0, 0xf7, 0xe7, 0x80, 0x40, 0x13d3, 0x3333, 0xfcef, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x24, 0x6a, 0x9}}]}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:20 executing program 0: r0 = io_uring_setup(0x7027, &(0x7f0000000500)) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0x2, &(0x7f0000000040)=[@ioring_restriction_sqe_flags_allowed={0x7}], 0x1) io_uring_register$IORING_REGISTER_FILES2(r0, 0xd, &(0x7f00000002c0)={0x1, 0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x0}, 0x20) 23:35:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_START_REQ(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x29, r2, 0x1, 0x0, 0x8000000, {}, [@IEEE802154_ATTR_PAN_COORD={0x5, 0x19, 0x1f}, @IEEE802154_ATTR_CHANNEL={0x5, 0x7, 0x5}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa3}, @IEEE802154_ATTR_PAN_COORD={0x5, 0x19, 0x68}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4) 23:35:20 executing program 1: ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x1265, 0x0) 23:35:20 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a1", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:20 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ec", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:20 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x1265, 0x0) 23:35:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@typedef={0x2}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000000100)=""/130, 0x28, 0x82, 0x1}, 0x20) [ 2992.395720][T23441] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2992.405164][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 2992.405181][ T27] audit: type=1804 audit(1689204920.808:3926): pid=23437 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2598/file0" dev="sda1" ino=1956 res=1 errno=0 23:35:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 23:35:20 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x1265, 0x0) [ 2992.524935][ T27] audit: type=1804 audit(1689204920.868:3927): pid=23442 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1009/file0" dev="sda1" ino=1973 res=1 errno=0 23:35:21 executing program 0: r0 = io_uring_setup(0x7027, &(0x7f0000000500)={0x0, 0x0, 0x40}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, &(0x7f0000000580), 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, 0x0, 0x0) 23:35:21 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ec", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) [ 2992.711814][T23196] usb 5-1: new high-speed USB device number 4 using dummy_hcd [ 2992.715510][ T27] audit: type=1804 audit(1689204921.128:3928): pid=23455 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2599/file0" dev="sda1" ino=1968 res=1 errno=0 [ 2993.091793][T23196] usb 5-1: New USB device found, idVendor=13d3, idProduct=3333, bcdDevice=fc.ef [ 2993.100950][T23196] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2993.117681][T23196] usb 5-1: config 0 descriptor?? [ 2993.163708][T23196] r8712u: register rtl8712_netdev_ops to netdev_ops [ 2993.170371][T23196] usb 5-1: r8712u: USB_SPEED_HIGH with 0 endpoints [ 2993.591832][T23196] usb 5-1: r8712u: Boot from EFUSE: Autoload Failed [ 2993.598571][T23196] usb 5-1: r8712u: MAC Address from efuse = 00:e0:4c:87:00:00 [ 2993.610819][T23196] usb 5-1: r8712u: Loading firmware from "rtlwifi/rtl8712u.bin" [ 2993.629606][T23196] usb 5-1: USB disconnect, device number 4 23:35:22 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000001280)={{0x12, 0x1, 0x0, 0xf7, 0xe7, 0x80, 0x40, 0x13d3, 0x3333, 0xfcef, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x24, 0x6a, 0x9}}]}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:22 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x1265, 0x0) 23:35:22 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ec", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:22 executing program 5: r0 = io_uring_setup(0x2, &(0x7f0000000000)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff5000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x8000000) 23:35:22 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sys_enter\x00', r0}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 23:35:22 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a1", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:22 executing program 1: syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x1265, 0x0) [ 2994.149740][ T27] audit: type=1804 audit(1689204922.558:3929): pid=23464 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1010/file0" dev="sda1" ino=1963 res=1 errno=0 23:35:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x127a, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "56451063f76d26d4466017943325e9b2db3d4fa022a73629d2173bfc8abbc75c873f6b58d54fe94d7b05a29cac0215f159440f83f885b0a8dff95c32b74c2a09", "aa9ce18774842e79737860b3fc59e06f69eb710313e1e53506fb20dd016c7546067913f59d997e5fd7dd90ae952e5f7da7ab2a3f6e8ebbdc168a8a9279e9f195", "48338c81f97c4b61221219c71c0b3087cbcc28ba89f6abc967747600c1f73a75"}}) 23:35:22 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_START_REQ(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x14, r2, 0x1, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) 23:35:22 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a1", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:22 executing program 1: syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x1265, 0x0) [ 2994.306473][ T27] audit: type=1804 audit(1689204922.588:3930): pid=23466 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2600/file0" dev="sda1" ino=1973 res=1 errno=0 23:35:22 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) [ 2994.449743][ T27] audit: type=1804 audit(1689204922.858:3931): pid=23478 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2601/file0" dev="sda1" ino=1968 res=1 errno=0 [ 2994.511734][T23195] usb 5-1: new high-speed USB device number 5 using dummy_hcd [ 2994.533001][ T27] audit: type=1804 audit(1689204922.918:3932): pid=23482 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1011/file0" dev="sda1" ino=1950 res=1 errno=0 [ 2994.891892][T23195] usb 5-1: New USB device found, idVendor=13d3, idProduct=3333, bcdDevice=fc.ef [ 2994.900966][T23195] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2994.920434][T23195] usb 5-1: config 0 descriptor?? [ 2994.966417][T23195] r8712u: register rtl8712_netdev_ops to netdev_ops [ 2994.975115][T23195] usb 5-1: r8712u: USB_SPEED_HIGH with 0 endpoints [ 2995.401818][T23195] usb 5-1: r8712u: Boot from EFUSE: Autoload Failed [ 2995.408481][T23195] usb 5-1: r8712u: MAC Address from efuse = 00:e0:4c:87:00:00 [ 2995.416569][T23195] usb 5-1: r8712u: Loading firmware from "rtlwifi/rtl8712u.bin" [ 2995.434097][T23195] usb 5-1: USB disconnect, device number 5 23:35:24 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000001280)={{0x12, 0x1, 0x0, 0xf7, 0xe7, 0x80, 0x40, 0x13d3, 0x3333, 0xfcef, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x24, 0x6a, 0x9}}]}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:24 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:24 executing program 5: r0 = io_uring_setup(0x7027, &(0x7f0000000500)={0x0, 0x0, 0x40}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, &(0x7f0000000100)=[@ioring_restriction_sqe_flags_required], 0x1) 23:35:24 executing program 1: syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x1265, 0x0) 23:35:24 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) r1 = getpid() fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$setown(r0, 0x4, r2) 23:35:24 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x4107}, {0x4c, 0x18, {0x0, @media='eth\x00'}}}}, 0x68}}, 0x0) 23:35:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {{}, {}, {0x14}}}, 0x30}}, 0x0) [ 2995.992253][ T27] audit: type=1804 audit(1689204924.408:3933): pid=23504 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2602/file0" dev="sda1" ino=1962 res=1 errno=0 23:35:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x127b, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "56451063f76d26d4466017943325e9b2db3d4fa022a73629d2173bfc8abbc75c873f6b58d54fe94d7b05a29cac0215f159440f83f885b0a8dff95c32b74c2a09", "aa9ce18774842e79737860b3fc59e06f69eb710313e1e53506fb20dd016c7546067913f59d997e5fd7dd90ae952e5f7da7ab2a3f6e8ebbdc168a8a9279e9f195", "48338c81f97c4b61221219c71c0b3087cbcc28ba89f6abc967747600c1f73a75"}}) [ 2996.103288][ T27] audit: type=1804 audit(1689204924.438:3934): pid=23509 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1012/file0" dev="sda1" ino=1973 res=1 errno=0 23:35:24 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:24 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 23:35:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x40081271, 0x0) [ 2996.322730][ T6086] usb 5-1: new high-speed USB device number 6 using dummy_hcd [ 2996.338664][ T27] audit: type=1804 audit(1689204924.748:3935): pid=23524 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2603/file0" dev="sda1" ino=1960 res=1 errno=0 [ 2996.722145][ T6086] usb 5-1: New USB device found, idVendor=13d3, idProduct=3333, bcdDevice=fc.ef [ 2996.731229][ T6086] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2996.741680][ T6086] usb 5-1: config 0 descriptor?? [ 2996.784146][ T6086] r8712u: register rtl8712_netdev_ops to netdev_ops [ 2996.790790][ T6086] usb 5-1: r8712u: USB_SPEED_HIGH with 0 endpoints [ 2997.211902][ T6086] usb 5-1: r8712u: Boot from EFUSE: Autoload Failed [ 2997.218608][ T6086] usb 5-1: r8712u: MAC Address from efuse = 00:e0:4c:87:00:00 [ 2997.227288][ T6086] usb 5-1: r8712u: Loading firmware from "rtlwifi/rtl8712u.bin" [ 2997.238066][ T6086] usb 5-1: USB disconnect, device number 6 23:35:26 executing program 4: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:26 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x125d, r0) 23:35:26 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:26 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) fcntl$setown(r0, 0x408, 0x0) 23:35:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x40081271, 0x0) 23:35:26 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a1", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x40081271, 0x0) 23:35:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x64}}}, 0x24}}, 0x0) 23:35:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x40086602, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "56451063f76d26d4466017943325e9b2db3d4fa022a73629d2173bfc8abbc75c873f6b58d54fe94d7b05a29cac0215f159440f83f885b0a8dff95c32b74c2a09", "aa9ce18774842e79737860b3fc59e06f69eb710313e1e53506fb20dd016c7546067913f59d997e5fd7dd90ae952e5f7da7ab2a3f6e8ebbdc168a8a9279e9f195", "48338c81f97c4b61221219c71c0b3087cbcc28ba89f6abc967747600c1f73a75"}}) [ 2997.777298][ T27] audit: type=1804 audit(1689204926.188:3936): pid=23544 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1013/file0" dev="sda1" ino=1973 res=1 errno=0 [ 2997.866087][ T27] audit: type=1804 audit(1689204926.218:3937): pid=23542 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2604/file0" dev="sda1" ino=1971 res=1 errno=0 23:35:26 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a1", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:26 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:26 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) io_uring_setup(0x7d2b, &(0x7f0000000000)={0x0, 0xca30, 0x6a, 0x0, 0x0, 0x0, r0}) [ 2998.007125][ T27] audit: type=1804 audit(1689204926.418:3938): pid=23554 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2605/file0" dev="sda1" ino=1954 res=1 errno=0 [ 2998.060280][ T27] audit: type=1804 audit(1689204926.468:3939): pid=23558 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1014/file0" dev="sda1" ino=1965 res=1 errno=0 23:35:26 executing program 4: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x40081271, 0x0) 23:35:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x125e, 0x0) 23:35:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x1275, 0xffffffffffffffff) 23:35:26 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:26 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a1", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x125e, 0x0) 23:35:26 executing program 1: r0 = io_uring_setup(0x6940, &(0x7f0000000000)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) 23:35:26 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) fcntl$setown(r0, 0x5, 0x0) [ 2998.393498][ T27] audit: type=1804 audit(1689204926.798:3940): pid=23568 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1015/file0" dev="sda1" ino=1972 res=1 errno=0 [ 2998.454427][ T27] audit: type=1804 audit(1689204926.828:3941): pid=23570 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2606/file0" dev="sda1" ino=1973 res=1 errno=0 23:35:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4020940d, &(0x7f00000000c0)={r1, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "56451063f76d26d4466017943325e9b2db3d4fa022a73629d2173bfc8abbc75c873f6b58d54fe94d7b05a29cac0215f159440f83f885b0a8dff95c32b74c2a09", "aa9ce18774842e79737860b3fc59e06f69eb710313e1e53506fb20dd016c7546067913f59d997e5fd7dd90ae952e5f7da7ab2a3f6e8ebbdc168a8a9279e9f195", "48338c81f97c4b61221219c71c0b3087cbcc28ba89f6abc967747600c1f73a75"}}) 23:35:26 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:26 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) [ 2998.679421][ T27] audit: type=1804 audit(1689204927.088:3942): pid=23584 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1016/file0" dev="sda1" ino=1961 res=1 errno=0 [ 2998.731188][ T27] audit: type=1804 audit(1689204927.098:3943): pid=23583 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2607/file0" dev="sda1" ino=1962 res=1 errno=0 23:35:27 executing program 4: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x125e, 0x0) 23:35:27 executing program 0: r0 = io_uring_setup(0x7027, &(0x7f0000000500)={0x0, 0x0, 0x40}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, 0x0, 0x0) 23:35:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0x1d, r0, &(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0) 23:35:27 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:27 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x125e, 0x0) 23:35:27 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040), 0x1000000000, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 23:35:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x19, {0xa1ffffff, 0x0, 0x3f}}}}, 0x30}}, 0x0) [ 2999.032452][ T27] audit: type=1804 audit(1689204927.448:3944): pid=23592 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir3308863244/syzkaller.ecxxFf/2608/file0" dev="sda1" ino=1972 res=1 errno=0 [ 2999.129772][ T27] audit: type=1804 audit(1689204927.498:3945): pid=23594 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1017/file0" dev="sda1" ino=1973 res=1 errno=0 23:35:27 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:27 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) r1 = getpid() fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$setown(r0, 0x8, r2) 23:35:27 executing program 5: ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x125e, 0x0) 23:35:27 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000000c0)={r1, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, "56451063f76d26d4466017943325e9b2db3d4fa022a73629d2173bfc8abbc75c873f6b58d54fe94d7b05a29cac0215f159440f83f885b0a8dff95c32b74c2a09", "aa9ce18774842e79737860b3fc59e06f69eb710313e1e53506fb20dd016c7546067913f59d997e5fd7dd90ae952e5f7da7ab2a3f6e8ebbdc168a8a9279e9f195", "48338c81f97c4b61221219c71c0b3087cbcc28ba89f6abc967747600c1f73a75"}}) 23:35:28 executing program 4: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:28 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:28 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_START_REQ(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x14, r2, 0x1, 0x0, 0x0, {0x27}}, 0x14}}, 0x0) 23:35:28 executing program 5: ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x125e, 0x0) 23:35:28 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000003c0), 0x100, 0x42882) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 23:35:28 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:28 executing program 5: ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x125e, 0x0) 23:35:28 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x1260, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "56451063f76d26d4466017943325e9b2db3d4fa022a73629d2173bfc8abbc75c873f6b58d54fe94d7b05a29cac0215f159440f83f885b0a8dff95c32b74c2a09", "aa9ce18774842e79737860b3fc59e06f69eb710313e1e53506fb20dd016c7546067913f59d997e5fd7dd90ae952e5f7da7ab2a3f6e8ebbdc168a8a9279e9f195", "48338c81f97c4b61221219c71c0b3087cbcc28ba89f6abc967747600c1f73a75"}}) 23:35:28 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x80041285, r0) 23:35:28 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x125e, 0x0) 23:35:28 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:28 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:28 executing program 4: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:28 executing program 0: add_key$fscrypt_v1(0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xfffffffffffffffe) 23:35:28 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x80001, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f00000000c0)=0x8) keyctl$link(0x9, r0, 0xfffffffffffffffb) 23:35:28 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x125e, 0x0) 23:35:28 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="78dc0b4bd459dd4de695c41b31f6bc2bec9b10af542211fbffe8873c0a535eb7fba3345f6e7642aff12b880a1a5ca8e18792672a485350429826f256d80ced5691353575657d45b1568006c5277b49fb58af8400e56ffaab6b4e07bfd93518e820e66e38c7e6eb1c545d183ec8ad9d034247e0999011a73ae2017ec2c48f3ea9cc2081113498a80f0014c86d61f846b08163b55b7073196bfea603b5d37d8a1a052007262e529b54bc2ab363f311de618b1e4ddd9ddd03678ab0894f81c9c68781e4400b79b8a7062ffc3b44da1091e152427cadbf7e172bb4b5f5620c627921838ce34aed3bf4733fcf8706d5130efdff9dd014dd7dac7dc1a18b3f", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:28 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:28 executing program 1: r0 = io_uring_setup(0x7027, &(0x7f0000000500)={0x0, 0x0, 0x40}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xc, 0x0, 0x0) 23:35:28 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x125e, 0x0) 23:35:28 executing program 0: r0 = io_uring_setup(0x7027, &(0x7f0000000500)) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0x13, &(0x7f0000000040)=[@ioring_restriction_sqe_flags_required={0x3, 0x2}], 0x2) 23:35:28 executing program 5: syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x125e, 0x0) 23:35:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$nfc_llcp(r0, 0x10e, 0x0, 0x0, 0x0) 23:35:28 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x0) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:29 executing program 4: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:29 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x127c, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "56451063f76d26d4466017943325e9b2db3d4fa022a73629d2173bfc8abbc75c873f6b58d54fe94d7b05a29cac0215f159440f83f885b0a8dff95c32b74c2a09", "aa9ce18774842e79737860b3fc59e06f69eb710313e1e53506fb20dd016c7546067913f59d997e5fd7dd90ae952e5f7da7ab2a3f6e8ebbdc168a8a9279e9f195", "48338c81f97c4b61221219c71c0b3087cbcc28ba89f6abc967747600c1f73a75"}}) 23:35:29 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000000c0)={r1, 0xa5, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "56451063f76d26d4466017943325e9b2db3d4fa022a73629d2173bfc8abbc75c873f6b58d54fe94d7b05a29cac0215f159440f83f885b0a8dff95c32b74c2a09", "aa9ce18774842e79737860b3fc59e06f69eb710313e1e53506fb20dd016c7546067913f59d997e5fd7dd90ae952e5f7da7ab2a3f6e8ebbdc168a8a9279e9f195", "48338c81f97c4b61221219c71c0b3087cbcc28ba89f6abc967747600c1f73a75"}}) 23:35:29 executing program 5: syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x125e, 0x0) 23:35:29 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x0) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:29 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x200400) fcntl$setown(r0, 0x406, 0x0) 23:35:29 executing program 5: syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x125e, 0x0) 23:35:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000006380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x1f}}, 0x50) syz_fuse_handle_req(r0, &(0x7f00000021c0)="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", 0x2000, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f00000041c0)="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", 0x2000, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x18}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x24c01, 0x0) writev(r2, &(0x7f0000000640)=[{&(0x7f0000000200)="d5", 0x1}], 0x1) syz_fuse_handle_req(r0, &(0x7f000000c3c0)="816c96148887f0384ff3140663599c1c0867997ee74b8cb5d1f7709c9fbbfd582f3219708d6619ee22f2a9d58cff9a7e83a97a3e9313dd2ee67eb444acee8bed193ffd1b94c5f5610313b3274101e04afa311ed11b65eace330d42989dd7e8ead49f4414939d5ec5e450de909fd314d28d5db56c3a56eacdc5d1384b39736ba46a5243f417d56c0640e09e22d8ff1ee2b30cb224d4c9d8a4d52af44a47d309f79420f1011681432596b9ea7177bbb8b5fc3d6ad56be4831d79c6c5b242dfed925214a3e9b54c78db2a82bbfd9d5474c79c99614415c14700cc3b3527e8ca0a73fc450d4d067e6b7e25dc2dd2360f732acefcaa8fbe1e11dab954e95347ee58735c9e339f4c8d3f41b2f9979d03487b4421779c4d56065a2e3c193fbc0eff7c8cf90ec30d78b49746708a494d8e28cb820b0ecb00c90e24896850a2bb38bb63239779ed8eb0c746c36513a98adb170d445ff8dacac8a36fa0810d29d1a8f4b71a07d5a48b7779e0d5e933456d6470d3ddd59e28510f0b02d05a8256abe06a21abcb7dad2a1147b2fa4c54b35f7a492981c7a1019cb715952a84ba4d483f722eb8b8bb56d06febf5d879a00657cd1a15cf040b1cd213c10f918c013fadf80d8be1e80a07b25201d92750c6b61da746b421ff74a3047cfe321da35bce3c225fead391bf5b7ed5057f07118eef94e4f8b3a7d75a37fd35cf9abb5e25f6c3c2d41f4e66fbff0b487566bafa21f9086428352190e94184a380ad2d45a6803ec234bdecc3a42b454fea19e0dfe7d5437b64c1cf31d034a9435584e347c5153492aab842e22634eb2cbfaa58620f0d71a1ab84233f54f90734fd0df64394a68ec845bd8fb1f60c6251b8dcbf9396148d2b4511c082a1548cd6032fb2cd59d0e52962c8030fee0fb5b828f925c30357e3ab7be9a45545bb413dee76987901985f4e053742c1c4bd9561ac76993e38e28f4920bd29e9d78d713659ba29e5bb38a42eb605e96f4820af6f7187f4e26a92df800ddf183f9d7741093ccf9ef88912ef9112ea1e734269bad9e90472fe427ea63b40419ddf43e43047aeaa553205d83668edef48c8c85c4d7e79f4317449966e7e7a891c8cd1d16bf0cc93df80bfd43ce751bb883634d2f6d11c5cd8af00a41e9337fb5a8624e8410697ebe61b150fbe0e85d7be153f1d3a27aed3aac075984c4406d4863f8db6f30a3e9a64ac4c625460f91fe1c272f44694743fbff0da32a9d74489de064d436268ace718d8d352228ca8d20ace46afcc406d499f3c16a75f0df5e4d411dbeed9c4ddb2627665bf909e0e9e801d42d46b0884b2dcac228b74765b4a973b9b8e8538d14df8a6670a8b83013bc5ff8d6304ea172fa45d2b289d140293da88989a2fbb7242e27638167349a1b9ab95ecc78889bb371bf2abe88c39ba94b1c074df20d06e14892d4b8abd196af9fa583613531c3d8623f6395da6507dbcf354e49b6f0f8e0b8033b4f78f7b0a5b71279383236cc9f3e4a636dc7c839b73bbfdda384ff4033900337e3dc67d7d0a8c1ae2a2be47869ffd740aa9f3b7c22daf194c3c5309c26a32cfb6385a2164543b813f99ff6870f89485a654c77d961bb0ca03f797c742a184667119f4dd95304d833292934d818cc600ae17cd874e7803da02eff222c4519165524b3909c637c7fa46c61b996f35147284d7603c2331ddd517490969157bf67152b154b933ebfc8d48fde03e1490e18fbaf536d095c1bd66531939071ac9fdfe2d1052ffdc06a3c8974d5258b59805e6ce1bc1ef32460ef1502d05770054b01d8b0a379170fd55767d0941cd470752c10fdbd4ded693e2d1e5a849add7666cdf2fdd8b5d55662c3c74940ae19782edebc593779c5b229b0f9ed48c603b68ec6db8266d8e6dbae6fd66951139f9763742b2257907bf1aeacffe12ea6cf2dcd2024c4112e0a60af677759abbccfef3df7c6625b7d4aa80e10c52aa89cbfc5078535ae33b18391e52e49dfac8b4231a51850a8fad2bd9efb7716b73992b3867a8db0f6d26535f0d8d42f83d17a1f56e1106fd9f8f40de4c7755b139d05933d3e261d5d9375a5c04f350c95ede7da8d56bd1a3fc88984312f249d1ab668c262d68b5e2dd82dea29f8f04162059a751b90613a58c1e47e4b1177eb771122f0a170f6ba55fbacf8db36450c6bc36892adc00d3a8ff8193dc0738f0050342121a40adbacc9a5ed6199c937034ea9361dd7bc49708cdf18ef030efc4d6a4507d237af9260239dd195507b888d6265d4897575a9756445f28231f7a5bdc8665804d82a383cd703fe300b97320e3522f27f316d30b5ff3918f9d9a5edb12e5aa4ad77f279373f5a0c1301ca77490761653bfe0f6af30d666d78bf41b2c1cedefcced234ecfc2d10d2a36650999142abb20ca35dcb2850224e8810e26d97f4b47d90b283ec73f58c0f49419ceb6eeb0a24151c85888b69c56cd760ccff7476125211e2d3cdcea98da1ec9909524dc65f8e819ec2d17ccb064d156a67a92f308421ef8e21f595fdf96e47facab5e44d20a81651f899342059bdd016b887c9acf254c04204e5384fcb9b47ed89581eee64257a2fccf68af026af497d703e68a6ef1ad2ada79f1a85acdce9493f8871229fc06162960c742c328105f63f808b6dc9e5d9c4874e6a28dd6cf257895f8651d53ad879f44b25fa24e1577e38b59c82dff068e5ff503e8eb50e7f6c9d7d26f1dc641ccc56bed27ea92fbe4cb2c46491dd752bbab4eafd69e65d49172f281c12e26e843256600f53bd8cc45203507acff96adfd9c3829f397e3cbf277869c733b1846cdeba4a4edf72c6b7575262161777b9e91ca1cb26bf2b590ebc8f16df11015483b6fb3466c97c4b30e8002019876903150c1c83c84f203c4dee3e873d00aaa388c09e91df8ef1f7531f6015d97142b3e5447815f6c7960f7e1f5bc51da794cce2170f1f2500d95fcc77022662c557268840bb1b14531e10d9327db1906e415436731ee1e7ec7a1b17fac12b0f82459071e25940526fc93b6c3c4b4bec4ec65c83a9c1b1ce52321b3d75e699bfca7306eed3559114dbd7868b20a54c0435b8edd8152f7fdd0d97a4118e58ead77c09beabbc5eb6e260404e8039c54026da7656ea91643a5f435c688f30ccdcf0826ae736be6a93470341fd985b941185adb268ac3d0a7981c85278065515298811d85f0c6f47e179a8db95d881ceab69777ca3a7f887a4d89d1c9418407f40e5ae1dd026c8a3f76187ac2fa19171a172b54965a672c734e3fa8da84d204bd68be17e4b660cbd12875b8e3b48fffadf00d3a567d06adcf37fbc347d604b1ec04b3ff9a6bfc5d4cdc8b2a2b5e8d5c95ffcc253d8c55b2227d61aa0238b30ebacf2249020d25868a4efe15ab205e2b0a568202a5be27a8b8d70bc2da95224c404f8dea386ae889f09f199fd89f8c6ddf58813efed26abc9d0914b8b21040b5f0de2e3509b9b8fb449f579ea80fd5106ca0d774c6b1131c8d2e324f14644cfba50ade0b0501b61dfce532cb05ec00890432ed5cd43612b09908d6bf4a96bc11120a4659e1b5e9b8d490846d6d1d4a3c24c2b5485f51b532e1a5022d899d29b46333d36eca86e6ce3750ebeea65bb37789b53c80ca2028d38b35b1f046071a4e1fc616c20193f7a05567e62274cdfc58a030a3d75eb2a10570be20a223582ab5200e6789d9e74823603b2ab053339ef51ede14c848d6dbafa4b9744fde39df8f5d2e755c578e4d1eefa76f656ee11c9c818adacc818f170ea3823d1d8adc166088a26bae40fa05a80725516bb9bb8ade9e1ac9dab95adada7c40acaf9ca010aed40caef4a683de1b6de33af5c546371ccef7c3437870eaa71ac366f85027bbe7c164c5307be4d6a821b42ac505d82800ba69f744d33f9ed23ae209537edd4a6a2501da1dcac16c6cc2e6c64f28fca110d15666d5376307e1b5a56affaf8503d8ea9b8250321b17a1a008aa07158c397db7d0da39dd739c29732c85b1769967814692dcebf43606d207fb69d1c9ccc15b6779a23c4cc5649e3872ed0da2d91e4ef1224d28c724a61f1d0a4cd9ffab75146cb78532c4586fc270e90df4f1d83a920378c0f1cbb4611b25bc333649f751faa789820cb6bebac16c2e504aea40e5d90440a1bf83e25ae937193b20d119dcc35096dcc12c47a7d5e002e99841be6d77e351196445b5b827b6076ad80e29fca6aea031ec80fb350199cf8d3d2e7954f2ebf140c6519ef675f518d81219ae52c63d44676aeea38c8f7f2d76055a2824685048542faebbc98e715481e2f30a4a2ac3a63fd8f0357d0975d69f785f68b191efff8c6f8ef05e4c800d43120e84966f78c20f49024637a5cfd257be6b6188de8796dbdf3a9491990ea6f78b9d77236cb334eeb02106e6a0dadebbb46786ddd365add383f1367d392fbde05a2aed164210a76aac7a7d5788c51f37d577295fd848402650b8aa27a7125cd7b34fa550c44840f98a11f387ec50d7ad7a3e644571c0bd4b84a0ad5e10295251c417e6998609a717ff7124e7caa858bb5e79fccffcd1b81fb5a9746b07100bb33ccbe0b48c56f71a613b20655ce02a564911edb95ad523fc887ace1924a80835fb1e4a16d67cc6bec25569ad9af8323663ef300eda68a9f2a765f44b94b5d19830c1e507c38219220d8a899545ce1e041e8204b91e36719ae65bce50ebedb0cc65be97848089b24305df7997790fe7069339c96b57d43df28b2ed9ef5859fa985d97936242487fdaae1fd966cc7b18fa7568e8e2486e8d51b9718d73a987a12de3b00896af2acc830be7f91733de99bc8fe02dc501de93f89dc7911ef7906f264d62b1a616a9227903c455d39ad3980d4e4db7269656252bedc018c58fe8baa87747ffbfadea63fa9749054c9782165ff49d36358aa857d0df24174404d5f431bb0aef103bb457eae30e1937dbf01dffa5150673b80516e9e5169c3b8b191460a04063e760e4572fb347358f8653f8531f3c04241a161e8541a4b052e5b33353087dcbf45f71456a1fef0cc92c969e69daee2e5dea149b7e68c342b04c4d39f712477faa67be685d1be291cfe9ba7aedfbde13897071ca7894a3d6ef8c91e8fa1f428c90a99b3ca8e12ebb686e86cffff385bcfbb28a9dae896ae968d821fdfaed80b212a5eead6642eeef97e87f261a8c4c619a85aeb73b12fb4645974122accb13769d3ec3eddcfae3ff36eecae82e92aeea902eac8402b49855eee240cb23abc57024dacb44d54df4a7b9a06da36e10fd24d3255abee7eccdc73e7c5562718ae1b478453112044a5c7ba00a240dcaa9e56ac8587bdba8a38e35c04a37c8d14f4a65cabbf8fea0fbd99d888c62c78e9e0486d4a81e2fdccf61a646b9d9a4bc6a06d58a2ec22e1ef6668b7bfb3d6f92cc044cc8c61790fb13935a14da3749db35baa2bab3e22efdb988289f9176a38309ff01da7f8bbaf1d8e9fbb578f2ef760c45f5e906372f8dcdfe5070e7bfc84be9505167f8528ee30ed67a4f1e3f1e00c0d98c7f7eccadab3912002f37f7251b7df13ad049178993c2113fda85984c8bd824d0e22437f2bc1a8b93bf557f47b6e6957ece727cb6790ad3d25890e96345c525112dd8ad8732228dfe226afa3b418b94a8b992671cfe47db685040419b871e1994d4fef1ddcacee6e4fb1d1611f151b8a6b557d829afccdc7b7331794b5a2d5a8b81717bf5df6cf962d094e245171e0771fc21e024ec61149f2d70460b3ed59ec433bf0c19c726d4ae3dc8cf38985aa03b603285920e420eaa9051f06f2b9cbc14887c1e0274092dcb3505f837eef03c2d5abfcacc141355c4b3b9a5d743c46ce762bed7ba6e390d79820870450fb2106a0f0024bc70317e5136241b12d0c9b544b0d83dbcadd21b9fa6e5bca9f9eeef367794194b156e7bc34c7c70ee3763fc9ca28eb275a57553e12995ff86476aecae4153efaf875ff17b1f503e7967f872252769ae2597a7c53c41de60e956ca8221c4b8765c109d0bf5d74367f528c23da74da840ce5fec377250d0675b27d380b41982b52defc5142c7c3c40c2dd05c856e57945b42493cb136a3d19a8dd0918eaba2ef57da977c1e744116006f1dc8f2c4bc766b671e108cd409a14b41c3cfa71ea8e7ef30595ee132a932b41c3790f1981924489dd6bbeafb4b45ebb181007846d0458c6a6033fee156dcec986395507e953be6ac7edb1de5016803476474a409081eeb38acfdf53335bad2db015889b98d22e42b3d6bdfa4c7394addfd4157e0bc86939d0412d2f7ade2f97dfb491a9e959c317049e961b54c220f4f73765d71b2e49a34d8f7109591c8576938d5fd5b478827c7d85b06163df188a63b74ada1e79f892336d21145b81fc60a92f57019f91662195239d3a2cce6883731afc0ef06431d490702c11f7e91cf2344ca462d9517471487b58d381fc84f6a8728396c9612fbebff86523a353a15e6e031b46c368b5289f3676e4513f4ca191858448beb3e464fe4c49580e82359bd236d0ce6fdc6c48c1eb7ae93040a51d937c20c57159bcf456b9e631e02effb9e8729c88f5e9f937329f650f82f8b3e5e88daa5228ca77aacbdc8dde4e9722bf0a140c7e009c9ab5da5f7d1d1c029445885150e9cd1e653c85c2814d4b3ce3bf4a9ce99efa29cadd42fe0c633472161e881be2ec69b426d72a5a634ad4fa9963b8631fc795f3e9b7dc5b09f411ca629429a3f76fd5d834f3adfcd6e6867ef2e95319fcfab25c36a5654e0dc8fa172bf64f9966cf96b9dc7c8f11e7e9b69dbda0e670b79f9da3d9d74ae35156a7f770635d21fae5b6c801fbd039f77824bf75ebef1b97ab007787c7658434a702033cf729f024dffe39c5c6c5ab2c4d27b9357463cf2dd2f0ff81435135bf9a2875de5d6f53eaea5125095c0ed518f726700282225cd2053eb60ee08721cc516ff9d6dcc3015c56b6eb66a2aef487a920e2fea5c277baf5198e80e98cd4aacd79634b3ffc0586f60c7e90a04bc872a7b0484457bf976bd17b12a842a744713601aaf8fbcf512056a252ef70e082ec22d0033c9c57de22cb3f271eedc5db38b461552e10ab02a4b04883a67387bcaf3c4fbff712aab23f9041041be8ca6bf6225a1a2bd2bd699707c31b9507e7927e87a729af0aaae043502959d0e01a262c3bacd791b4d74c47d2cde7472766bbecab722c6e03f0bcf6ae5d38447f81819b5a583d49d9a239f5b524f80aba3487998f29ff64e62780f2c371645a5bea62e5591c903ca88f60de1e3722d311b47d47b783456812aa13b6c43bc69651d867a999f3aa67abf4a6f39b676e74ced8ed456fa5115744dfdf4720bf6c1406d924d8d8e96c84902b47c078a9fef27f36d52cb84faffe1e75ccd4f6d279c7518cc6b2a2e85566d7d3df5cdc2b3706fefb8e7652640064e16e6bda16409b8a221046916f1a84e8252a02304a95b7d2eaca53ba864b83143924b781a44de33981d204d9cc3fe3047f64fb9b0caea741a1aa4bb8425f3dd9766ea60792308df9d705f3f5b2fabd4738258cccac044f31fa3b7e710036463a4a18f713dcc5b69e248270b0fe75d4c097a7e82bcc87922cf27b576821d84a269df29e34a8115b9e7009424f93a754f5b3808e4f887c4de0ea6cd14c9cf7da31231846007bc111f91df506d3eeaff4a8c533a4f96c8c3dc2678acfe0cd59699656c78c51f313ee35d9520d954773e208813403be45598533d9b2057200921ee1e75f5819b0782a4144b5f66f552e2d0d6e7160b7251bdbd5d527a4bdd813ebd78934a6e59b923a178e1fc7e0e64b3bdd28e2cbc29102a73d381697efb252182aaa9ce4f84ad916a05fbf742033ea97c2103eaaad8d23dd83854945ac8914833bc316cfcd161e56e9e9e51c81baec5839a9c88efda9e520feda59f216c6b6375a9f1647580cd4233df7d67333d2556556e64cbca75c606c2a26e031acffbd6ce76a4ae6786dd1a27bf65d727ac23c041ce30689a5f7c3a663850287c9f6bd575e9f94c3de79e14d2efb11980df873898e086f6019cd62083860d9e2b1461a1df799822a5356a4d1bc43e82529380aa342388fbd4176ec1ea96961eb9dbe46d7c8300127c72faab4e01d3c975f8f91cfc671483d7651d34b3cf6c1fcadf39a9640b7812724f3ecb12cad3dd03eb1837a96cc3027424d090608f07b653785f7a37fbc0729eb82fd16ad175def70d81fd6a855f15d5da148cc96d734eb2c70e3e8b538dd12a18007ea2e0f4bfbe894df7b5b0fa373abf84d2554e5785b6ee6ba5039a714a2a53d446f420f20eb61304b9e5c84a14792eec3a70e074a90fa7e566a9e7a9ecd61f4409aedfd2ab9feebe3c2ec4c66e5f326151243254116b4da00167a8a8a0d1bd685bd7e6979f83ac4b4048f842c606fe2c81347697a8299433eaed3a7ff833ddf84012cbbd08ae1261bdbb59f82adf7dae9d1c3389b51470283314034d7c46553d28a8eb2abb07f45123b8a49be51af447d8b9e4cee89345669c2f2dfb848b93762cc6932fc95eb5de7435c745c7a94b030ae18b77d1d9e971a19d15e58811b553c3ee05bfe11acab670024b4c0c66f450730f0601dd0ef02f700be08ae0b0dd5cc8a104bcda4415a9ef15727989438bc5bdcc056b409d4fb7fb6058fb6880f3d3365b474ad5841ba2197781b73d733a7e482a759a6109eb3487548f96999916c046406cd7b6bc4e416197bdc254c5b85d1c31f3742d743136f1f85021b33fb117dfffb2942c3d0a13239bf431988b700f78498d85b8fbff0fb0ea4a6cc846d4405050a1ddcad55efa894952063a7e09d4caf270ced7d899e920346ff85fa1bc87d64c721ab151383069f1546bd7dbb29fa3610913975a73c9c71db1f0c9dca9191ab87b0e5fb81a8dff8cb623fd2161b409b2d4314addc067adfdcde9fb0d13881edf201dda655a93a5d52611b9af80873e5a841479bcff282303126db88f51af9e74d2df87c5f80d2be720646255ce0210880d1477b97dcf1dea8d84fbc87246e888afd27f2ba5776168235b7f8d618443b5630d9e5dd395da0547f445e5930bd9299044916e9bd89f1cb3a56c73bda389a3c3bb8a8dba7cdcb5158efc6cc627000d36b322b6b228eca2f2976c72c4937d1e47384b0a98bf16be1d4e5bec6fb6f3a93b8c4bcbf0b8e579346ed5f7230eb140c54aed72cab5a470f34eec59b20383aad52c6eb696d607e4face4792130dbc18a09385ff0139a812a9f54d85341e6799f898973395c412cf6087f7c8093a4d91501327f3fc057b39fcae67cb19b1d6c57fecdf5d3f7e1307e5f8c968bbb0945258d5224a8d8da7b912a2581eecb92029754f2c6e0e22e0d79ef788bcc73a598343cb62cd3c943c59d2a4eff5dbfad8b3a7c6733d87f1f4d530553e36db8d3863f071ac589d5714874dbb7d24e1257259654418590443981551545b4a46061aef3b6d53819e0be47f97945639d076448e609dffa03799824f3eaed2783283f305687740726ead8935ae5b285055fafeb4592cbc66aca236a8654ab1866ab7e169339c9626f0880d750fce07fcb7795f2e187bf72bb42c4d5233580494b6de45871f02909fed88ce6816ae0e08b9e2fd6eacdcc0801224d59c443280bd94bc57f51fa184963356ae5d3c28cedc08698aff6f2af876ee754ecd30372c61afe4a4479447c579466fb282f0459a85e081fd167d1a366a8af78efc14fa7e1aae801a393d1ca9a027d540a2c858d431c5e1f2d48193838d5b2c20e27ddfc641b9d5bdbcf4f294439535efc2cf2b6251cefa5c6881cae706ec432c4a99075afdac2f70067ddef107813756aa8309d3bce9d48afdbeb3334b9eb9f304d409ea244bf10e41a2e8577d6f45841fd42a6744cf1b0ca2e7e792f5f9d015bc812de889e499a051b1e77a9ffc86b78eacbb30449243e181bdc50b31ff9f94c11a6c41b590312d12d9a309a19880e162d13fb4dacbb6db7c3a41b942b8da3bc0ff8310c2ac270144a6e7e7593f28e2e2da902ee074885583715b7d754f28cfd2cc122ff1eac9aa403a4c9dc32c82e6420c1c90de65238f8973f30e5c5f5e54ad5147d7bd83ac9aada9f31937a4230a28f1528fb229161a02c1c4403f644a94a12ac010dd6c137342e7b9877f82c6661d90d5aae00380ab2d99d45fd3b1b83dc5bb88841e02635cb54db415649493fc3eecf11637b6dc48f545aa4d0f2a721ee5a20bc6aaf73367ceb921706fefcb03d5b9c3ffc61f24a4b6182615df6f542ab475026142c1f78f0d149430304d0e576377fe42c9af56f31595ca408ee384ac08d30805765abd231cff0156993de40f3c6570a6123be4bf8db0d943314b2ac01001a3a7f75ececc43f38ab427f0421fea1c17e366bdaaeb5a61635e840b75d1483d8c26899865f1892017826dfd5c9dcfa0c40ed77b39e7b2cc217841ff79d5299a10b147acaaaaae8c0492ebd51db67b5b5f508190810b377a6a832b6c89bf4e6b7210146e810b39b4465a738612a7c0d9f99c2936e702e26de02075f4d1939654bd475ac4b7d83f655f4d9643643b2e1b560e74900f79c9cf742e906c238011395b0bc4c7c1057601ef5a64d47b14e74e763d9c9cea07e9624caedb9c00ad81a58015a99bccd1a9a8ac69ab054f26e9dfd754204d2e5010c80bab2c737948f06ac2fbfee92f5d60f496d1c1b63a3f2f12b6c4ef5ae5aae1c0225cf54330f8e3365f94f2033a2662660846a286df4aa44a78f867025b61a42b9680bdf8160e9107f4a1c8006dfcad41ec035b1ac2f47e037dd0c8cd89e7bf5e2b49820d921da83be289af08985cc155c5d310d2d0dcb6595eeb7cfe8826e4f035574bc610deb60e6c120cb8a1c5b22f51c3c2444f7c99ee8a62849cb4148c8521cba99c55e563d2f9eb86e2d1274d3f0bb35d08eb239fa2e58bac7e54314c3273bb9ce498119c75f30392113abd23ccd8bbc2c3664c8173b91d34dad1d3c74a422ebeaf691c3fb76f5399a0102cff92f9cc3191f22e3e675060193a36ea7b7df8801b533314d27263e5668399d39dc4ed604fb07fa825e1810aa2cb2214a31b3195fc33d52fd12ad961bc22b2a4641340924cb05706a2a72615a416b7e03e887bd7a606a183bfa6abbbca6e915886486bc6ddbc5f79769f5abe411f03739277826ae6efb6cbc78608e43b85f096d6b0b4b487661cce7328e1f4c583c8160d9a99072e3ba2f0ee5a01463a4bcacc1a7fb45d578dd5fafadde1d2dfa7a3fc37158de5df382597aa1615040aea8e4d3494179fc8f63a259637e1d156b0da83f37ea74da2d6ee14bdb0542d38572902bd50c55f90baab136cfbc674a4232c72279e4ff4284c82b4b7f383cd7bb5d61b881da4c5b4d14739f63943888a70b3029aefc37fc113258872ebaeab34c102765fdacb9ec38f9e61302880d885660d63a311e38ddc634080d180ed45c273d0a8269265966a7758bc6e576865fe963aac16a0b21c2e4d6dd8bc22ccdfa170f85198eae226ece52d9b63870acbf8e8bea22081e3884a47054fd4499b49a7707c646829495421111ed5ee8e4af83f1120e257091daa07b85ef004c2bdd3f7ffaa2a8c05d14b8dfd76473b5752785895bd6ef7b", 0x2000, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={0x18}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:29 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:29 executing program 1: linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) sync() 23:35:29 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x0) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:29 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000001280)={{0x12, 0x1, 0x0, 0xf7, 0xe7, 0x80, 0x0, 0x13d3, 0x3333, 0xfcef, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x24, 0x6a, 0x9}}]}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_START_REQ(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x14, r2, 0x1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 23:35:29 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}}, 0x24008804) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:29 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(0xffffffffffffffff, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:29 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x23586a0f90a434d1) fcntl$setown(r0, 0x2, 0x0) 23:35:29 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) fcntl$setown(r0, 0x407, 0x0) 23:35:29 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x6, r1, 0x0) 23:35:30 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000004640)={&(0x7f0000000800)=ANY=[@ANYBLOB="6800000024000b0400"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000038000200000000000000000000000000e4c87aa6000000000000000014000d"], 0x68}}, 0x0) [ 3001.666654][T23704] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3001.696671][T23704] [ 3001.699049][T23704] ===================================================== [ 3001.705982][T23704] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 3001.713449][T23704] 6.1.38-syzkaller #0 Not tainted [ 3001.718495][T23704] ----------------------------------------------------- [ 3001.725465][T23704] syz-executor.1/23704 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 3001.733532][T23704] ffffffff8d0023a0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x2a/0x2a0 [ 3001.742630][T23704] [ 3001.742630][T23704] and this task is already holding: [ 3001.750008][T23704] ffff888079e27108 (&sch->q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 3001.758903][T23704] which would create a new lock dependency: [ 3001.764785][T23704] (&sch->q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 3001.771936][T23704] [ 3001.771936][T23704] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 3001.781390][T23704] (&sch->q.lock){+.-.}-{2:2} [ 3001.781414][T23704] [ 3001.781414][T23704] ... which became SOFTIRQ-irq-safe at: [ 3001.793793][T23704] lock_acquire+0x1f8/0x5a0 [ 3001.798396][T23704] _raw_spin_lock+0x2a/0x40 [ 3001.802995][T23704] __dev_queue_xmit+0xd50/0x3c90 [ 3001.808086][T23704] ip6_finish_output2+0xf61/0x15b0 [ 3001.813289][T23704] ip6_finish_output+0x6ac/0xa80 [ 3001.818320][T23704] ndisc_send_skb+0xb04/0x1380 [ 3001.823245][T23704] addrconf_rs_timer+0x357/0x610 [ 3001.828277][T23704] call_timer_fn+0x19e/0x6b0 [ 3001.832968][T23704] __run_timers+0x67c/0x890 [ 3001.837569][T23704] run_timer_softirq+0x63/0xf0 [ 3001.842425][T23704] __do_softirq+0x2e9/0xa4c [ 3001.847030][T23704] __irq_exit_rcu+0x155/0x240 [ 3001.851852][T23704] irq_exit_rcu+0x5/0x20 [ 3001.856185][T23704] sysvec_apic_timer_interrupt+0x91/0xb0 [ 3001.861907][T23704] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 3001.867982][T23704] page_table_check_clear+0x20e/0x850 [ 3001.873514][T23704] unmap_page_range+0x1b4a/0x2740 [ 3001.878664][T23704] unmap_vmas+0x3c4/0x560 [ 3001.883083][T23704] exit_mmap+0x252/0x9f0 [ 3001.887421][T23704] __mmput+0x115/0x3c0 [ 3001.891612][T23704] exit_mm+0x226/0x300 [ 3001.895775][T23704] do_exit+0x67e/0x2300 [ 3001.900029][T23704] do_group_exit+0x202/0x2b0 [ 3001.904717][T23704] get_signal+0x16f7/0x17d0 [ 3001.909334][T23704] arch_do_signal_or_restart+0xb0/0x1a10 [ 3001.915086][T23704] exit_to_user_mode_loop+0x6a/0x100 [ 3001.920465][T23704] exit_to_user_mode_prepare+0xb1/0x140 [ 3001.926097][T23704] syscall_exit_to_user_mode+0x60/0x270 [ 3001.931728][T23704] do_syscall_64+0x49/0xb0 [ 3001.936234][T23704] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3001.942981][T23704] [ 3001.942981][T23704] to a SOFTIRQ-irq-unsafe lock: [ 3001.949993][T23704] (fs_reclaim){+.+.}-{0:0} [ 3001.950020][T23704] [ 3001.950020][T23704] ... which became SOFTIRQ-irq-unsafe at: [ 3001.962384][T23704] ... [ 3001.962391][T23704] lock_acquire+0x1f8/0x5a0 [ 3001.969551][T23704] fs_reclaim_acquire+0x83/0x120 [ 3001.974590][T23704] slab_pre_alloc_hook+0x2a/0x2a0 [ 3001.979715][T23704] __kmem_cache_alloc_node+0x47/0x260 [ 3001.985175][T23704] kmalloc_trace+0x26/0xe0 [ 3001.989676][T23704] alloc_workqueue_attrs+0x46/0xc0 [ 3001.994904][T23704] wq_numa_init+0x122/0x4b0 [ 3001.999535][T23704] workqueue_init+0x22/0x59d [ 3002.004222][T23704] kernel_init_freeable+0x40a/0x61f [ 3002.009544][T23704] kernel_init+0x19/0x290 [ 3002.013988][T23704] ret_from_fork+0x1f/0x30 [ 3002.018542][T23704] [ 3002.018542][T23704] other info that might help us debug this: [ 3002.018542][T23704] [ 3002.028770][T23704] Possible interrupt unsafe locking scenario: [ 3002.028770][T23704] [ 3002.037088][T23704] CPU0 CPU1 [ 3002.042453][T23704] ---- ---- [ 3002.047813][T23704] lock(fs_reclaim); [ 3002.051798][T23704] local_irq_disable(); [ 3002.058549][T23704] lock(&sch->q.lock); [ 3002.065233][T23704] lock(fs_reclaim); [ 3002.071748][T23704] [ 3002.075213][T23704] lock(&sch->q.lock); [ 3002.079557][T23704] [ 3002.079557][T23704] *** DEADLOCK *** [ 3002.079557][T23704] [ 3002.087706][T23704] 2 locks held by syz-executor.1/23704: [ 3002.093249][T23704] #0: ffffffff8e096b28 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 3002.102808][T23704] #1: ffff888079e27108 (&sch->q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 3002.112049][T23704] [ 3002.112049][T23704] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 3002.122464][T23704] -> (&sch->q.lock){+.-.}-{2:2} { [ 3002.127505][T23704] HARDIRQ-ON-W at: [ 3002.131487][T23704] lock_acquire+0x1f8/0x5a0 [ 3002.137642][T23704] _raw_spin_lock_bh+0x31/0x40 [ 3002.144058][T23704] dev_reset_queue+0x131/0x1a0 [ 3002.150476][T23704] dev_deactivate_many+0x525/0xaf0 [ 3002.157241][T23704] dev_deactivate+0x177/0x270 [ 3002.163571][T23704] linkwatch_do_dev+0x104/0x160 [ 3002.170076][T23704] __linkwatch_run_queue+0x448/0x6b0 [ 3002.177031][T23704] linkwatch_event+0x48/0x50 [ 3002.183270][T23704] process_one_work+0x8aa/0x11f0 [ 3002.189861][T23704] worker_thread+0xa5f/0x1210 [ 3002.196194][T23704] kthread+0x26e/0x300 [ 3002.201961][T23704] ret_from_fork+0x1f/0x30 [ 3002.208034][T23704] IN-SOFTIRQ-W at: [ 3002.212012][T23704] lock_acquire+0x1f8/0x5a0 [ 3002.218162][T23704] _raw_spin_lock+0x2a/0x40 [ 3002.224320][T23704] __dev_queue_xmit+0xd50/0x3c90 [ 3002.230920][T23704] ip6_finish_output2+0xf61/0x15b0 [ 3002.237683][T23704] ip6_finish_output+0x6ac/0xa80 [ 3002.244271][T23704] ndisc_send_skb+0xb04/0x1380 [ 3002.250696][T23704] addrconf_rs_timer+0x357/0x610 [ 3002.257291][T23704] call_timer_fn+0x19e/0x6b0 [ 3002.263553][T23704] __run_timers+0x67c/0x890 [ 3002.269711][T23704] run_timer_softirq+0x63/0xf0 [ 3002.276127][T23704] __do_softirq+0x2e9/0xa4c [ 3002.282286][T23704] __irq_exit_rcu+0x155/0x240 [ 3002.288616][T23704] irq_exit_rcu+0x5/0x20 [ 3002.294521][T23704] sysvec_apic_timer_interrupt+0x91/0xb0 [ 3002.301808][T23704] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 3002.309447][T23704] page_table_check_clear+0x20e/0x850 [ 3002.316497][T23704] unmap_page_range+0x1b4a/0x2740 [ 3002.323174][T23704] unmap_vmas+0x3c4/0x560 [ 3002.329244][T23704] exit_mmap+0x252/0x9f0 [ 3002.335149][T23704] __mmput+0x115/0x3c0 [ 3002.340869][T23704] exit_mm+0x226/0x300 [ 3002.346597][T23704] do_exit+0x67e/0x2300 [ 3002.352415][T23704] do_group_exit+0x202/0x2b0 [ 3002.358659][T23704] get_signal+0x16f7/0x17d0 [ 3002.364809][T23704] arch_do_signal_or_restart+0xb0/0x1a10 [ 3002.372097][T23704] exit_to_user_mode_loop+0x6a/0x100 [ 3002.379036][T23704] exit_to_user_mode_prepare+0xb1/0x140 [ 3002.386233][T23704] syscall_exit_to_user_mode+0x60/0x270 [ 3002.393431][T23704] do_syscall_64+0x49/0xb0 [ 3002.399503][T23704] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3002.407048][T23704] INITIAL USE at: [ 3002.410937][T23704] lock_acquire+0x1f8/0x5a0 [ 3002.417002][T23704] _raw_spin_lock_bh+0x31/0x40 [ 3002.423332][T23704] dev_reset_queue+0x131/0x1a0 [ 3002.429675][T23704] dev_deactivate_many+0x525/0xaf0 [ 3002.436367][T23704] dev_deactivate+0x177/0x270 [ 3002.442625][T23704] linkwatch_do_dev+0x104/0x160 [ 3002.449039][T23704] __linkwatch_run_queue+0x448/0x6b0 [ 3002.455890][T23704] linkwatch_event+0x48/0x50 [ 3002.462076][T23704] process_one_work+0x8aa/0x11f0 [ 3002.468582][T23704] worker_thread+0xa5f/0x1210 [ 3002.474826][T23704] kthread+0x26e/0x300 [ 3002.480483][T23704] ret_from_fork+0x1f/0x30 [ 3002.486471][T23704] } [ 3002.488963][T23704] ... key at: [] qdisc_alloc.__key+0x0/0x20 [ 3002.496980][T23704] [ 3002.496980][T23704] the dependencies between the lock to be acquired [ 3002.496990][T23704] and SOFTIRQ-irq-unsafe lock: [ 3002.510502][T23704] -> (fs_reclaim){+.+.}-{0:0} { [ 3002.515389][T23704] HARDIRQ-ON-W at: [ 3002.519365][T23704] lock_acquire+0x1f8/0x5a0 [ 3002.525522][T23704] fs_reclaim_acquire+0x83/0x120 [ 3002.532109][T23704] slab_pre_alloc_hook+0x2a/0x2a0 [ 3002.538789][T23704] __kmem_cache_alloc_node+0x47/0x260 [ 3002.545815][T23704] kmalloc_trace+0x26/0xe0 [ 3002.551882][T23704] alloc_workqueue_attrs+0x46/0xc0 [ 3002.558662][T23704] wq_numa_init+0x122/0x4b0 [ 3002.564838][T23704] workqueue_init+0x22/0x59d [ 3002.571105][T23704] kernel_init_freeable+0x40a/0x61f [ 3002.577973][T23704] kernel_init+0x19/0x290 [ 3002.583964][T23704] ret_from_fork+0x1f/0x30 [ 3002.590042][T23704] SOFTIRQ-ON-W at: [ 3002.594024][T23704] lock_acquire+0x1f8/0x5a0 [ 3002.600177][T23704] fs_reclaim_acquire+0x83/0x120 [ 3002.606764][T23704] slab_pre_alloc_hook+0x2a/0x2a0 [ 3002.613446][T23704] __kmem_cache_alloc_node+0x47/0x260 [ 3002.620475][T23704] kmalloc_trace+0x26/0xe0 [ 3002.626542][T23704] alloc_workqueue_attrs+0x46/0xc0 [ 3002.633332][T23704] wq_numa_init+0x122/0x4b0 [ 3002.639497][T23704] workqueue_init+0x22/0x59d [ 3002.645745][T23704] kernel_init_freeable+0x40a/0x61f [ 3002.652599][T23704] kernel_init+0x19/0x290 [ 3002.658582][T23704] ret_from_fork+0x1f/0x30 [ 3002.664656][T23704] INITIAL USE at: [ 3002.668547][T23704] lock_acquire+0x1f8/0x5a0 [ 3002.674622][T23704] fs_reclaim_acquire+0x83/0x120 [ 3002.681120][T23704] slab_pre_alloc_hook+0x2a/0x2a0 [ 3002.687709][T23704] __kmem_cache_alloc_node+0x47/0x260 [ 3002.694649][T23704] kmalloc_trace+0x26/0xe0 [ 3002.700625][T23704] alloc_workqueue_attrs+0x46/0xc0 [ 3002.707304][T23704] wq_numa_init+0x122/0x4b0 [ 3002.713398][T23704] workqueue_init+0x22/0x59d [ 3002.719559][T23704] kernel_init_freeable+0x40a/0x61f [ 3002.726329][T23704] kernel_init+0x19/0x290 [ 3002.732223][T23704] ret_from_fork+0x1f/0x30 [ 3002.738208][T23704] } [ 3002.740699][T23704] ... key at: [] __fs_reclaim_map+0x0/0xe0 [ 3002.748671][T23704] ... acquired at: [ 3002.752475][T23704] lock_acquire+0x1f8/0x5a0 [ 3002.757148][T23704] fs_reclaim_acquire+0x83/0x120 [ 3002.762254][T23704] slab_pre_alloc_hook+0x2a/0x2a0 [ 3002.767456][T23704] __kmem_cache_alloc_node+0x47/0x260 [ 3002.773001][T23704] __kmalloc_node+0xa2/0x230 [ 3002.777759][T23704] kvmalloc_node+0x6e/0x180 [ 3002.782434][T23704] get_dist_table+0x91/0x380 [ 3002.787203][T23704] netem_change+0x9a0/0x1ea0 [ 3002.791967][T23704] netem_init+0x58/0xb0 [ 3002.796302][T23704] qdisc_create+0x8a1/0x1220 [ 3002.801061][T23704] tc_modify_qdisc+0x9e0/0x1da0 [ 3002.806081][T23704] rtnetlink_rcv_msg+0x776/0xf00 [ 3002.811187][T23704] netlink_rcv_skb+0x1cd/0x410 [ 3002.816174][T23704] netlink_unicast+0x7bf/0x990 [ 3002.821106][T23704] netlink_sendmsg+0xa26/0xd60 [ 3002.826040][T23704] ____sys_sendmsg+0x59e/0x8f0 [ 3002.831005][T23704] __sys_sendmsg+0x2a9/0x390 [ 3002.835777][T23704] do_syscall_64+0x3d/0xb0 [ 3002.840477][T23704] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3002.846572][T23704] [ 3002.848915][T23704] [ 3002.848915][T23704] stack backtrace: [ 3002.854804][T23704] CPU: 0 PID: 23704 Comm: syz-executor.1 Not tainted 6.1.38-syzkaller #0 [ 3002.863217][T23704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 3002.873317][T23704] Call Trace: [ 3002.876614][T23704] [ 3002.879541][T23704] dump_stack_lvl+0x1e3/0x2cb [ 3002.884232][T23704] ? nf_tcp_handle_invalid+0x642/0x642 [ 3002.889701][T23704] ? panic+0x75d/0x75d [ 3002.893865][T23704] ? print_shortest_lock_dependencies+0xee/0x150 [ 3002.900195][T23704] validate_chain+0x4d2e/0x58e0 [ 3002.905074][T23704] ? reacquire_held_locks+0x660/0x660 [ 3002.910471][T23704] ? validate_chain+0x115/0x58e0 [ 3002.915426][T23704] ? llist_add_batch+0x160/0x1d0 [ 3002.920467][T23704] ? find_next_clump8+0x1a0/0x1a0 [ 3002.925502][T23704] ? preempt_schedule+0xd9/0xe0 [ 3002.930413][T23704] ? tick_nohz_tick_stopped+0x77/0xb0 [ 3002.935793][T23704] ? mark_lock+0x9a/0x340 [ 3002.940210][T23704] ? irq_work_queue+0xc6/0x150 [ 3002.945054][T23704] __lock_acquire+0x125b/0x1f80 [ 3002.949916][T23704] lock_acquire+0x1f8/0x5a0 [ 3002.954421][T23704] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 3002.959655][T23704] ? read_lock_is_recursive+0x10/0x10 [ 3002.965025][T23704] ? __lock_acquire+0x125b/0x1f80 [ 3002.970233][T23704] fs_reclaim_acquire+0x83/0x120 [ 3002.975196][T23704] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 3002.980401][T23704] slab_pre_alloc_hook+0x2a/0x2a0 [ 3002.985521][T23704] ? kvmalloc_node+0x6e/0x180 [ 3002.990198][T23704] __kmem_cache_alloc_node+0x47/0x260 [ 3002.995579][T23704] ? kvmalloc_node+0x6e/0x180 [ 3003.000252][T23704] __kmalloc_node+0xa2/0x230 [ 3003.004844][T23704] kvmalloc_node+0x6e/0x180 [ 3003.009383][T23704] get_dist_table+0x91/0x380 [ 3003.013986][T23704] netem_change+0x9a0/0x1ea0 [ 3003.018587][T23704] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 3003.024573][T23704] ? netem_destroy+0xb0/0xb0 [ 3003.029184][T23704] ? do_raw_spin_unlock+0x137/0x8a0 [ 3003.034417][T23704] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 3003.040331][T23704] ? lockdep_hardirqs_on+0x94/0x130 [ 3003.045547][T23704] ? memset+0x1f/0x40 [ 3003.049595][T23704] ? __hrtimer_init+0x181/0x260 [ 3003.054459][T23704] netem_init+0x58/0xb0 [ 3003.058639][T23704] ? qdisc_peek_dequeued+0x220/0x220 [ 3003.063927][T23704] qdisc_create+0x8a1/0x1220 [ 3003.068531][T23704] ? qdisc_notify+0x390/0x390 [ 3003.073213][T23704] tc_modify_qdisc+0x9e0/0x1da0 [ 3003.078073][T23704] ? rcu_lock_release+0x20/0x20 [ 3003.082962][T23704] ? rcu_lock_release+0x20/0x20 [ 3003.087818][T23704] rtnetlink_rcv_msg+0x776/0xf00 [ 3003.092758][T23704] ? print_irqtrace_events+0x210/0x210 [ 3003.098221][T23704] ? rtnetlink_bind+0x80/0x80 [ 3003.102897][T23704] ? __local_bh_enable_ip+0x164/0x1f0 [ 3003.108275][T23704] ? local_bh_enable+0x5/0x20 [ 3003.112961][T23704] ? _local_bh_enable+0xa0/0xa0 [ 3003.117818][T23704] ? __dev_queue_xmit+0x177a/0x3c90 [ 3003.123029][T23704] ? netdev_core_pick_tx+0x320/0x320 [ 3003.128317][T23704] ? ref_tracker_free+0x638/0x7d0 [ 3003.133344][T23704] ? memcpy+0x3c/0x60 [ 3003.137329][T23704] ? refcount_inc+0x80/0x80 [ 3003.141874][T23704] netlink_rcv_skb+0x1cd/0x410 [ 3003.146641][T23704] ? rtnetlink_bind+0x80/0x80 [ 3003.151334][T23704] ? netlink_ack+0xe60/0xe60 [ 3003.155931][T23704] netlink_unicast+0x7bf/0x990 [ 3003.160696][T23704] ? netlink_detachskb+0x90/0x90 [ 3003.165735][T23704] ? __virt_addr_valid+0x22b/0x2e0 [ 3003.170877][T23704] ? __phys_addr_symbol+0x2b/0x70 [ 3003.175909][T23704] ? __check_object_size+0x4dd/0xa30 [ 3003.181203][T23704] ? bpf_lsm_netlink_send+0x5/0x10 [ 3003.186371][T23704] netlink_sendmsg+0xa26/0xd60 [ 3003.191147][T23704] ? netlink_getsockopt+0x5b0/0x5b0 [ 3003.196363][T23704] ? aa_sock_msg_perm+0x91/0x150 [ 3003.201339][T23704] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 3003.206629][T23704] ? security_socket_sendmsg+0x7d/0xa0 [ 3003.212100][T23704] ? netlink_getsockopt+0x5b0/0x5b0 [ 3003.217299][T23704] ____sys_sendmsg+0x59e/0x8f0 [ 3003.222083][T23704] ? __sys_sendmsg_sock+0x30/0x30 [ 3003.227128][T23704] __sys_sendmsg+0x2a9/0x390 [ 3003.231747][T23704] ? ____sys_sendmsg+0x8f0/0x8f0 [ 3003.236698][T23704] ? rcu_is_watching+0x11/0xb0 [ 3003.241475][T23704] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 3003.247458][T23704] ? syscall_enter_from_user_mode+0x2e/0x220 [ 3003.253440][T23704] ? lockdep_hardirqs_on+0x94/0x130 [ 3003.258639][T23704] ? syscall_enter_from_user_mode+0x2e/0x220 [ 3003.264622][T23704] do_syscall_64+0x3d/0xb0 [ 3003.269050][T23704] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3003.274953][T23704] RIP: 0033:0x7f8302e7cb29 [ 3003.279371][T23704] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 3003.298978][T23704] RSP: 002b:00007f8303c5f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3003.307392][T23704] RAX: ffffffffffffffda RBX: 00007f8302f9bf80 RCX: 00007f8302e7cb29 [ 3003.315363][T23704] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 3003.323344][T23704] RBP: 00007f8302ec847a R08: 0000000000000000 R09: 0000000000000000 [ 3003.331339][T23704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3003.339308][T23704] R13: 000000000000000b R14: 00007f8302f9bf80 R15: 00007ffd88f00018 [ 3003.347286][T23704] [ 3003.350340][T23196] usb 5-1: new high-speed USB device number 7 using dummy_hcd [ 3003.350444][T23704] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 3003.367339][T23704] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 23704, name: syz-executor.1 [ 3003.376854][T23704] preempt_count: 201, expected: 0 [ 3003.382028][T23704] RCU nest depth: 0, expected: 0 [ 3003.386981][T23704] INFO: lockdep is turned off. [ 3003.391778][T23704] Preemption disabled at: [ 3003.391791][T23704] [<0000000000000000>] 0x0 [ 3003.400572][T23704] CPU: 0 PID: 23704 Comm: syz-executor.1 Not tainted 6.1.38-syzkaller #0 [ 3003.409011][T23704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 3003.419087][T23704] Call Trace: [ 3003.422383][T23704] [ 3003.425336][T23704] dump_stack_lvl+0x1e3/0x2cb [ 3003.430058][T23704] ? nf_tcp_handle_invalid+0x642/0x642 [ 3003.435557][T23704] ? panic+0x75d/0x75d [ 3003.439654][T23704] ? rcu_is_watching+0x11/0xb0 [ 3003.444463][T23704] __might_resched+0x5cb/0x780 [ 3003.449287][T23704] ? __might_sleep+0xb0/0xb0 [ 3003.453935][T23704] slab_pre_alloc_hook+0x4a/0x2a0 [ 3003.459000][T23704] ? kvmalloc_node+0x6e/0x180 [ 3003.463713][T23704] __kmem_cache_alloc_node+0x47/0x260 [ 3003.469128][T23704] ? kvmalloc_node+0x6e/0x180 23:35:31 executing program 0: mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3, &(0x7f00000000c0)=0x7fa, 0x4, 0x0) 23:35:31 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x24008804) ftruncate(0xffffffffffffffff, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) 23:35:31 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01002bbd7000ffdbdfb72d5f83e50423a17f3dcbdd7fbe066c2501000000050003006c00000008000600ac1e01011400090000000000000000f7ffffff0000000001060001004e240000050003000c000000060001004e21000004000500050003002b000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4001}, 0x881) r0 = open(&(0x7f0000000580)='./file0\x00', 0x10000000181540, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001200)) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x404402}, 0xc, &(0x7f00000008c0)={&(0x7f0000000e80)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x2, 0xffffffffffffffff, 0x6}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRESDEC], 0x1058}, 0x1, 0x0, 0x0, 0x2004c040}, 0x4040000) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r6 = open(&(0x7f00000004c0)='./file0\x00', 0x101002, 0x9b) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x0, 0x2, 0x1, 0x0, 0xffffffffffffffff}) fcntl$getflags(r6, 0x408) clock_gettime(0x6, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x90000002, 0x948e396, 0x101c, 0x3fffffffffff, 0x20009, 0x2, 0x5, 0x7647}, &(0x7f0000000340)={0x6, 0x100000001, 0x7, 0xff, 0x807fffffff, 0xfc, 0x5099, 0x7ff}, &(0x7f0000000440)={0x7, 0x400103, 0x6, 0x9, 0x8000000200, 0x20009, 0x81}, &(0x7f0000000880)={0x0, 0x0}) syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), r6) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7, @ANYBLOB="9c6fa37e047b96458cb65137abb3afd2a068000000361d12a8bd525103ff030000000000007aae20cdf1ffd922e82bdab28a804219637eb00300b8ca483706610103ccec07ddd489b258c91561ad58572fd812e47ff4a62ca670f35497bb843bb8d59d7b6923d71fb82ed0ecdb1512ee64a109", @ANYRES16=r2], 0x20}, 0x1, 0x0, 0x0, 0x240281d4}, 0x0) ftruncate(r5, 0x3fffd) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000009c0), &(0x7f0000000380)=0x19) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) getsockname$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x200000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8120}, [@IFLA_MASTER={0x8, 0x4, r8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000851}, 0x20000040) setsockopt$inet_group_source_req(r4, 0x0, 0x2e, &(0x7f0000000a00)={0x81, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 23:35:31 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) faccessat(r0, &(0x7f0000000880)='./file0\x00', 0x0) [ 3003.473844][T23704] __kmalloc_node+0xa2/0x230 [ 3003.478467][T23704] kvmalloc_node+0x6e/0x180 [ 3003.483017][T23704] get_dist_table+0x91/0x380 [ 3003.487618][T23704] netem_change+0x9a0/0x1ea0 [ 3003.492249][T23704] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 3003.498253][T23704] ? netem_destroy+0xb0/0xb0 [ 3003.502857][T23704] ? do_raw_spin_unlock+0x137/0x8a0 [ 3003.508062][T23704] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 3003.513960][T23704] ? lockdep_hardirqs_on+0x94/0x130 [ 3003.519171][T23704] ? memset+0x1f/0x40 [ 3003.523159][T23704] ? __hrtimer_init+0x181/0x260 [ 3003.528023][T23704] netem_init+0x58/0xb0 [ 3003.532189][T23704] ? qdisc_peek_dequeued+0x220/0x220 [ 3003.537500][T23704] qdisc_create+0x8a1/0x1220 [ 3003.542104][T23704] ? qdisc_notify+0x390/0x390 [ 3003.546786][T23704] tc_modify_qdisc+0x9e0/0x1da0 [ 3003.551655][T23704] ? rcu_lock_release+0x20/0x20 [ 3003.556528][T23704] ? rcu_lock_release+0x20/0x20 [ 3003.561378][T23704] rtnetlink_rcv_msg+0x776/0xf00 [ 3003.566319][T23704] ? print_irqtrace_events+0x210/0x210 [ 3003.571781][T23704] ? rtnetlink_bind+0x80/0x80 [ 3003.576459][T23704] ? __local_bh_enable_ip+0x164/0x1f0 [ 3003.581839][T23704] ? local_bh_enable+0x5/0x20 [ 3003.586533][T23704] ? _local_bh_enable+0xa0/0xa0 [ 3003.591390][T23704] ? __dev_queue_xmit+0x177a/0x3c90 [ 3003.596616][T23704] ? netdev_core_pick_tx+0x320/0x320 [ 3003.601906][T23704] ? ref_tracker_free+0x638/0x7d0 [ 3003.606932][T23704] ? memcpy+0x3c/0x60 [ 3003.610915][T23704] ? refcount_inc+0x80/0x80 [ 3003.615434][T23704] netlink_rcv_skb+0x1cd/0x410 [ 3003.620204][T23704] ? rtnetlink_bind+0x80/0x80 [ 3003.624904][T23704] ? netlink_ack+0xe60/0xe60 [ 3003.629515][T23704] netlink_unicast+0x7bf/0x990 [ 3003.634288][T23704] ? netlink_detachskb+0x90/0x90 [ 3003.639233][T23704] ? __virt_addr_valid+0x22b/0x2e0 [ 3003.644354][T23704] ? __phys_addr_symbol+0x2b/0x70 [ 3003.649387][T23704] ? __check_object_size+0x4dd/0xa30 [ 3003.654679][T23704] ? bpf_lsm_netlink_send+0x5/0x10 [ 3003.659824][T23704] netlink_sendmsg+0xa26/0xd60 [ 3003.664596][T23704] ? netlink_getsockopt+0x5b0/0x5b0 [ 3003.669799][T23704] ? aa_sock_msg_perm+0x91/0x150 [ 3003.674743][T23704] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 3003.680029][T23704] ? security_socket_sendmsg+0x7d/0xa0 [ 3003.685501][T23704] ? netlink_getsockopt+0x5b0/0x5b0 [ 3003.690718][T23704] ____sys_sendmsg+0x59e/0x8f0 [ 3003.695498][T23704] ? __sys_sendmsg_sock+0x30/0x30 [ 3003.700647][T23704] __sys_sendmsg+0x2a9/0x390 [ 3003.705272][T23704] ? ____sys_sendmsg+0x8f0/0x8f0 [ 3003.710245][T23704] ? rcu_is_watching+0x11/0xb0 [ 3003.715022][T23704] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 3003.721022][T23704] ? syscall_enter_from_user_mode+0x2e/0x220 [ 3003.727007][T23704] ? lockdep_hardirqs_on+0x94/0x130 [ 3003.732216][T23704] ? syscall_enter_from_user_mode+0x2e/0x220 [ 3003.738201][T23704] do_syscall_64+0x3d/0xb0 [ 3003.742632][T23704] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3003.748548][T23704] RIP: 0033:0x7f8302e7cb29 [ 3003.752966][T23704] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 3003.772571][T23704] RSP: 002b:00007f8303c5f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3003.780984][T23704] RAX: ffffffffffffffda RBX: 00007f8302f9bf80 RCX: 00007f8302e7cb29 [ 3003.788973][T23704] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 3003.796945][T23704] RBP: 00007f8302ec847a R08: 0000000000000000 R09: 0000000000000000 [ 3003.804914][T23704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3003.812970][T23704] R13: 000000000000000b R14: 00007f8302f9bf80 R15: 00007ffd88f00018 [ 3003.820951][T23704] [ 3003.825695][T23196] usb 5-1: device descriptor read/64, error 18 [ 3003.884637][ T27] kauditd_printk_skb: 14 callbacks suppressed [ 3003.884652][ T27] audit: type=1804 audit(1689204932.298:3960): pid=23708 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3831872981/syzkaller.yuZ5mm/1025/file0" dev="sda1" ino=1970 res=1 errno=0 [ 3004.101634][T23196] usb 5-1: new high-speed USB device number 8 using dummy_hcd [ 3004.291691][T23196] usb 5-1: device descriptor read/64, error 18 [ 3004.411846][T23196] usb usb5-port1: attempt power cycle [ 3004.705718][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 3004.901711][T23196] usb 5-1: new high-speed USB device number 9 using dummy_hcd [ 3004.991866][T23196] usb 5-1: Invalid ep0 maxpacket: 0 [ 3005.141689][T23196] usb 5-1: new high-speed USB device number 10 using dummy_hcd [ 3005.231815][T23196] usb 5-1: Invalid ep0 maxpacket: 0 [ 3005.238090][T23196] usb usb5-port1: unable to enumerate USB device [ 3005.524854][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 3008.011720][T23196] usb 5-1: new high-speed USB device number 11 using dummy_hcd [ 3008.201641][T23196] usb 5-1: device descriptor read/64, error 18 [ 3008.471661][T23196] usb 5-1: new high-speed USB device number 12 using dummy_hcd [ 3008.661680][T23196] usb 5-1: device descriptor read/64, error 18 [ 3008.782143][T23196] usb usb5-port1: attempt power cycle [ 3009.191672][T23196] usb 5-1: new high-speed USB device number 13 using dummy_hcd [ 3009.281781][T23196] usb 5-1: Invalid ep0 maxpacket: 0 [ 3009.431654][T23196] usb 5-1: new high-speed USB device number 14 using dummy_hcd [ 3009.521838][T23196] usb 5-1: Invalid ep0 maxpacket: 0 [ 3009.528007][T23196] usb usb5-port1: unable to enumerate USB device