=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setresgid(r6, 0x0, 0x0) write$P9_RGETATTR(r4, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, r5, r6, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x11000000, 0x92b, 0x10001, 0x1, 0xfb, 0x4, 0x42c4, 0x2, 0x3f}}, 0xa0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast2}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) setresgid(r3, r6, r2) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:04 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x1, 0x24004880) 11:02:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) getpeername$l2tp6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000140)=0x20) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r3, 0xc0305615, &(0x7f0000000080)={0x0, {0x1, 0x1}}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x620242, 0x40) socket$inet6(0xa, 0x2, 0x0) r5 = socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xffffffffffffffff, 0x0, r6) ioprio_get$uid(0x3, r6) fchownat(r4, &(0x7f0000000040)='./file0\x00', r6, 0xee01, 0x100) 11:02:05 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x6143, 0x0) bind$l2tp6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6cf1, 0x4}, 0x20) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) 11:02:05 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x1, 0x24004880) 11:02:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000140)) setresgid(0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r4, 0x1, 0x0) read$midi(r4, &(0x7f0000000080)=""/169, 0xa9) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000680)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r4, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, r5, 0x800, 0x70bd2d, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4048840}, 0x8084) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r5, 0x1, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20004001) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000040)=""/131, 0x83) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000000)=')\x00') sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0xb4, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_STA_EXT_CAPABILITY={0x90, 0xac, "5017e9026cb18b6af157515d71eae61822516cd4803d4a061aa4ddeb33136b9319ddf6dcc5839c6075a4ad02fdcbd11eb512d247769a4b78bcfb8c582a8b2324683e5a1427f6c5f3b5cc3e9013246133a1314d176e667e224f418ac4c03b3a5f361c2a03dfae579582ce4d2e10fb26e65a6763d26e2d3ab49497679f8aa81b3a3e98e0bc2d9cd42d23b5a97e"}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xc}]}, 0xb4}, 0x1, 0x0, 0x0, 0x800}, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r4, 0xc010640c, &(0x7f0000000000)={0x4}) dup(r4) sendmsg$NL80211_CMD_GET_KEY(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1a4bc457d4a4b255}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="24a9c800187e9d3dd8f603b047f8c2bb1da332af30790500000022f076c01fcf92fda59d63efe7144a826c4d64be09d179d8b5fd3cbdb4bd8e031a235094d4f294c1acd9fbd5336a66dcc1748e89c1838157bd05a3bef7b8d86c71369a8862ba198596f0a32185e46dbc5d2b88752f6e302bfe3c8ad3f3d4f080f274ef3222a0231b29d967f941b5f035d4b0f424094a9caef5cee70beaf4a47d809ad2b1a210f79042eb8928f41ea269e284068d", @ANYRES16=0x0, @ANYBLOB="010029bd7000fddbdf25090000000800090005ac0f000500080003000000"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:02:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000000)={0x3, r4}) r5 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) recvfrom$inet6(r5, &(0x7f00000000c0)=""/224, 0xe0, 0x10000, 0x0, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r6, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x80000, 0x0) ioctl$IOC_PR_CLEAR(r7, 0x401070cd, &(0x7f0000000240)={0xfe}) 11:02:05 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0x7ffff000}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:05 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r3, 0x1, 0x0, 0x0, {{}, {}, {0x11}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r3, 0x300, 0x70bd2a, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x80) r4 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:05 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) syz_open_procfs(r1, &(0x7f0000000040)='net/igmp\x00') setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) 11:02:05 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x200, 0x0) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f0000000040)=0x6) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:05 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000140)) setresgid(0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r4, 0x1, 0x0) read$midi(r4, &(0x7f0000000080)=""/169, 0xa9) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000680)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r4, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, r5, 0x800, 0x70bd2d, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4048840}, 0x8084) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r5, 0x1, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20004001) 11:02:05 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:05 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4}) r3 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000000)={0x4}) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5, 0x28000) r4 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r4, 0xc010640c, &(0x7f0000000000)={0x4}) dup2(r2, r4) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:06 executing program 3: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x80040) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)={0xc9, 0x0, [], [@ra={0x5, 0x2, 0x9}, @pad1]}, 0x10) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETSW2(r3, 0x402c542c, &(0x7f0000000100)={0x0, 0x101, 0x8000, 0x3, 0x4, "78932183ecd2acdebeec6e43ae0e6ed4bf2817", 0x1, 0x9}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$rds(r5, &(0x7f0000000140)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x39}}, 0x10) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) 11:02:06 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0x8dffffff}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:06 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000000)={@any, 0x1, 0x4, 0x580f}) r2 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0xac, 0x2e, 0x2a, 0x20, 0x7ca, 0xb800, 0x82f4, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x5, 0x5f, 0xb, 0x0, [], [{}]}}]}}]}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0x1f) syz_usb_ep_read(r2, 0x0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep2(r2, 0x83, 0x12, &(0x7f0000000040)=@conn_svc_rsp={0x0, 0x0, 0xa, "344809ef", {0x3, 0x102, 0x0, 0x5, 0x1, 0x1, 0x1}}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000080)='%S\\$\x00', 0x0, r1) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:06 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/mcfilter\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000200), 0x8) 11:02:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000140)) setresgid(0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r3, 0x1, 0x0) read$midi(r3, &(0x7f0000000080)=""/169, 0xa9) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000680)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, r4, 0x800, 0x70bd2d, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4048840}, 0x8084) 11:02:06 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {0x0}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:06 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') ftruncate(r0, 0x80000000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) 11:02:06 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {0x0}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:06 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) [ 2023.072742][T21667] usb 3-1: new high-speed USB device number 9 using dummy_hcd 11:02:06 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {0x0}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:06 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$can_j1939(0x1d, 0x2, 0x7) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$can_j1939(r6, &(0x7f0000000240)={0x1d, r4}, 0x18) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000080)={@private0, @private0={0xfc, 0x0, [], 0x1}, @private0, 0xfff, 0x6, 0x6, 0x100, 0xffffffff, 0x800000, r4}) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) [ 2023.349892][T21667] usb 3-1: Using ep0 maxpacket: 32 [ 2023.480495][T21667] usb 3-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping 11:02:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000140)) setresgid(0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r3, 0x1, 0x0) read$midi(r3, &(0x7f0000000080)=""/169, 0xa9) syz_genetlink_get_family_id$net_dm(&(0x7f0000000680)='NET_DM\x00') 11:02:06 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:06 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0xf0ffffff}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) [ 2023.660374][T21667] usb 3-1: New USB device found, idVendor=07ca, idProduct=b800, bcdDevice=82.f4 [ 2023.683666][T21667] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2023.708149][T21667] usb 3-1: Product: syz [ 2023.724888][T21667] usb 3-1: Manufacturer: syz [ 2023.749652][T21667] usb 3-1: SerialNumber: syz [ 2023.768124][T21667] usb 3-1: config 0 descriptor?? 11:02:07 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x43}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r3, r4, 0x0, 0x8607) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x23, &(0x7f00000002c0)={r6}, 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000000c0)={r6, @in6={{0xa, 0x4e22, 0x0, @local}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)={r6, 0x3}, &(0x7f00000000c0)=0x8) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) 11:02:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x20001) r2 = socket$can_j1939(0x1d, 0x2, 0x7) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r2, &(0x7f0000000140)={0x1d, r4}, 0x1c) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000000c0)={@mcast1, 0x44, r4}) 11:02:07 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:07 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0xffffff7f}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) [ 2024.049330][T21089] usb 3-1: USB disconnect, device number 9 11:02:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000140)) setresgid(0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r3, 0x1, 0x0) read$midi(r3, &(0x7f0000000080)=""/169, 0xa9) 11:02:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x14, r3, 0x1707}, 0x14}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0x130, r3, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xec}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x750d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x84d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x38f8621b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x8000}, 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x43}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r4, r5, 0x0, 0x8607) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r6, 0x84, 0x23, &(0x7f00000002c0)={r7}, 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f00000000c0)={r7, @in6={{0xa, 0x4e22, 0x0, @local}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={r7, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e24, 0x0, @private2, 0x7fffffff}]}, &(0x7f0000000180)=0x10) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:07 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3800000000000, 0x6}, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000200", @ANYRES16=r3, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x20049045}, 0x8000) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0xe0, r3, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x67}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1b}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x400}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x5e}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x57}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x1}}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x37}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9f78}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xe403}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3f}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4008805}, 0x400c000) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000340)={'nat\x00'}, &(0x7f0000000180)=0x54) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:07 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2", 0x34}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:07 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2", 0x34}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:08 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2", 0x34}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000140)) setresgid(0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r3, 0x1, 0x0) 11:02:08 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000080)=0x7, 0x4) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) 11:02:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0103, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1a, 0x8}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x200000f797, 0xe2e84d1a2dd27037) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) socket$inet(0x2, 0x3, 0x9) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4}) dup2(r2, r1) setresgid(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SOUND_MIXER_WRITE_RECSRC(r4, 0xc0044dff, &(0x7f0000000040)=0x1f) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setfsgid(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VHOST_VSOCK_SET_GUEST_CID(r5, 0x4008af60, &(0x7f0000000080)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = socket$inet(0x2, 0x3, 0x2) r2 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = syz_open_dev$binderN(0x0, 0x0, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000000c0)={0x4, 0x0, &(0x7f0000000080)=[@register_looper], 0x1, 0x0, &(0x7f0000000140)="0e"}) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd3, &(0x7f0000000000), 0x3c) writev(0xffffffffffffffff, &(0x7f00000005c0), 0x0) 11:02:08 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0xffffff8d}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:08 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d576", 0x4e}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:08 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x4}) writev(r0, &(0x7f00000005c0)=[{&(0x7f00000000c0)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0x52}], 0x1) 11:02:08 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) io_submit(r1, 0xffffffe0, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15000000, 0x0, 0x17, 0x1, 0x0, r0, &(0x7f0000000000), 0x23000}]) io_destroy(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000140)) setresgid(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x0) 11:02:08 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) getsockname(r1, &(0x7f0000000080)=@l2tp={0x2, 0x0, @local}, &(0x7f0000000100)=0x80) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') prctl$PR_SET_SECUREBITS(0x1c, 0x4) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180)='ethtool\x00') r5 = socket$can_j1939(0x1d, 0x2, 0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r5, &(0x7f0000000240)={0x1d, r7}, 0x18) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x60, r4, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x24000040}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) fdatasync(r3) 11:02:08 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d576", 0x4e}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 11:02:08 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000140)={&(0x7f0000ffc000/0x2000)=nil, 0xbe, 0x1, 0x48, &(0x7f0000ffc000/0x3000)=nil, 0x3f}) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000080)={0xfffffffffffffff9, 0x0, 0x0, 0x8}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000000c0)={r4, 0x8}) 11:02:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:08 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d576", 0x4e}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:09 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$UHID_INPUT(r6, &(0x7f0000000240)={0x8, {"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", 0x1000}}, 0x1006) socket$bt_rfcomm(0x1f, 0x1, 0x3) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000200)=0x8000000000, 0x8) 11:02:09 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0xfffffff0}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='cpuset\x00', r1}, 0x10) 11:02:09 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871", 0x5b}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000140)) setresgid(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x0) 11:02:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9b355d4bc8e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0x52}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCCBRK(r2, 0x5428) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r5, 0x1, 0x23, &(0x7f00000000c0)=0x8, 0x4) dup(r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) 11:02:09 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0x8dffffff}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:09 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871", 0x5b}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4}) r3 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000000)={0x4}) dup2(r1, r3) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:09 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000580)={[0xff, 0x20, 0x7, 0x9, 0x101, 0x1000, 0x9, 0x3ff, 0x8, 0x4, 0x100000001, 0x80, 0x799, 0x41, 0x7fffffff, 0xfffffffffffffff7], 0xd000, 0xa240}) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={&(0x7f0000000240)="99e5dde85b9aafebfd20ba23a83dfea2438f59bfe12941ccd549191cbfce2d9cb61571ab53608558689df61cf9203a7947b43fe27560b3d513e90d5531b0816baabb6bc5997236783a36c6e313bf31c678a6777c98c7a61f312dad84c87cbd88b88b33d086331f3318dce3b8d7a960ab31184a0d78618338e6ba83f57623c48f10057c697f630cdb09ced2175a6d515124a5770a2b8330", &(0x7f0000000300)=""/95, &(0x7f0000000380)="9f30771eb9dcc9e213279795721060dcd3d7e90dc68d6c9b56c38e93d96cecf297b650527ec5bd83cada57fc1ce582d9bd47037dda03dac51361ac2eb9ffd71b36fa3af1a1da87d8ca206c541a64fa87f6038b5ac61ba19bd4e4b1f6c04c197e73b6e5ccece2a51cbc05a25961cba481dc7e2526b8c31d286e4714756f5845d2297f019e7d686ac015bd8a1b503e0f6acfc0069caf3ad77f2d924d82a9804b1f1b36ec265d48c8455b40d4a0c42dcc93e417ec4d332d7925415e29f06f8bf81fb51b839234", &(0x7f0000000480)="63f373d30e428a15c5a37c1abe5027178e3ccd8635597a150965c35e000f14cb893de941e8c64da1e8ee50f59bbde92de12c3448aa570cdeb0ff37f67237d89d3df52b5bb79628bb61fb40f4a5ac557256a4b99217d32e471ff8dfe44d10824c0e7de48875aacce463333a4cb32e3bf23d7c2f32aa8c68c7c15a2313895f3c826b3a8c19e2a720bef2e1e9e6f6e023e080c40bdf933a745a8d5046300f9bde4c2911c0f755cc6e50d0ce1fafc06ea3c7e5d408b0514bc32c6dd5ffed967591105eda504f110511923f8a98628359cc8d2617d27fe33db2790835b52fb04ebf85", 0x401, r2, 0x4}, 0x38) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x4}) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000040)="b88194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f000100008e6aea070000005286b31a260e60482bb0b4179b3758", 0x52}, {&(0x7f0000000140)="fc61b07634bab254daae708245e79cdc0f0b8538a8a6272a6cb3ed21e7d7aaeeab053e4959a7faea723f201060065a43a4b4d5c3ab8e3ddb465e0b2236515a68caf481c122c817030ef7eaf887ecf981c770bdcef3366c093a9b95b84d6d611961e5dc6422660214f5c7ed73699e66f428139f85ada0d70220515fa6343319a08768aa"}], 0x2c) 11:02:09 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871", 0x5b}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:09 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de38", 0x62}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0), 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(r1, 0x1, &(0x7f00000000c0)={{r2, r3+60000000}, {r4, r5+60000000}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 11:02:09 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0x7ffffffff000}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:09 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000440)={&(0x7f0000000180)={0x1d, r3}, 0x10, &(0x7f0000000400)={&(0x7f0000000380)={0x6, 0x94, 0xfffff001, {r4, r5/1000+60000}, {0x77359400}, {0x0, 0x0, 0x0, 0x1}, 0x1, @canfd={{0x0, 0x1, 0x1, 0x1}, 0x1b, 0x1, 0x0, 0x0, "4f4adea57b6ede68092ea0ad0bb20542be64c93750e7691a4ef8a55f8bda49a2bf9ba6e73dcee21ee996b49fcac5b908d12ca221e3367e9e8fef6d813c511e6e"}}, 0x80}, 0x1, 0x0, 0x0, 0x4}, 0x4000) r6 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000000)=0x1) 11:02:09 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de38", 0x62}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000140)) setresgid(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x0) 11:02:09 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0xffffff8d}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:10 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de38", 0x62}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:10 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1a", 0x65}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000140)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r3, 0x1, 0x0) 11:02:10 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1a", 0x65}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) io_setup(0x7, &(0x7f0000000000)) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) 11:02:10 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1a", 0x65}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:10 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0xf0ff7f00000000}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) 11:02:10 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e", 0x67}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r3, 0x1, 0x0) 11:02:10 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0x7ffff000}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000600)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@private1, @in=@dev}, {@in=@multicast1, 0x0, 0x33}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@algo_auth_trunc={0x4c, 0x14, {{'digest_null\x00'}}}]}, 0x13c}}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmmsg(r6, &(0x7f0000000180), 0xf1, 0x0) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x20, r9, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_BSSID={0xa, 0xf5, @local}]}, 0x20}}, 0x804) sendmsg$NL80211_CMD_GET_WIPHY(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r9, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x1) 11:02:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f0000000240)={0x6, 'virt_wifi0\x00', {0x1}, 0x676}) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f00000002c0)={0x0, 0x3, 0x7, 0x101, 0x100}) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x140f, 0x300, 0x70bd2c, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x28}, 0x1, 0x0, 0x0, 0x4014}, 0x80) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000300)={0x2, 0x800}) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:11 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e", 0x67}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:11 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e", 0x67}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:11 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4(r1, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r2, 0x1, 0x0) 11:02:11 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:11 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0xf0ffffff7f0000}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:11 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x4, 0x109081) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4}) socket$phonet(0x23, 0x2, 0x1) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000000c0)={0x0, 0x1, 0x4, 0x1, 0x7fff, {0x77359400}, {0x1, 0x0, 0x1, 0x1, 0x80, 0x40, "5c924878"}, 0x2a8, 0x1, @fd=r1, 0x160, 0x0, r2}) ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f0000000000)) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0xf4, 0x101000) 11:02:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r2, 0x1, 0x0) 11:02:11 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f0000000240)={0x6, 'virt_wifi0\x00', {0x1}, 0x676}) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f00000002c0)={0x0, 0x3, 0x7, 0x101, 0x100}) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x140f, 0x300, 0x70bd2c, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x28}, 0x1, 0x0, 0x0, 0x4014}, 0x80) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000300)={0x2, 0x800}) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x4, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x10200, 0xfffffffffffffffd, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setresgid(r3, 0x0, 0x0) write$P9_RGETATTR(r1, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, r2, r3, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x11000000, 0x92b, 0x10001, 0x1, 0xfb, 0x4, 0x42c4, 0x2, 0x3f}}, 0xa0) setresgid(0x0, r3, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, 0x0, 0x0, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x11000000, 0x92b, 0x10001, 0x1, 0xfb, 0x4, 0x42c4, 0x2, 0x3f}}, 0xa0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setresgid(r6, 0x0, 0x0) write$P9_RGETATTR(r4, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, r5, r6, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x11000000, 0x92b, 0x10001, 0x1, 0xfb, 0x4, 0x42c4, 0x2, 0x3f}}, 0xa0) getgroups(0x6, &(0x7f00000000c0)=[r3, 0xee00, r3, 0xffffffffffffffff, r3, r6]) setregid(0x0, r7) 11:02:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0x52}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000000c0)={0x9d, 0x19c, 0xac, "a6e402fedced97dfd157215026357fdf06f1ae30455efcbba4ea19657852c16109a34be774ad59343a3bba414fe16440d856b358ff66c7800d33cac252faba24757a8a585b29d2a285a7e3ff1c3f7e47e2d26e31e9d916d3997512732a0446757c638236c7de7e5b2ba73cfb6af480229bee7bd0c934813b351642f019712e20cfb02ec85cf4fe187c565c0a9fe0c39f877075faf8a52732c32fa5b4a1"}) 11:02:11 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {0x0}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r2, 0x1, 0x0) 11:02:11 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {0x0}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:11 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0x100000000000000}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) socket$alg(0x26, 0x5, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r1, 0x1, 0x0) 11:02:12 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = mq_open(&(0x7f0000000000)='\x00', 0x901, 0x2, &(0x7f0000000040)={0xc0000000000000, 0x1a1aa0bc, 0x3ff, 0x4}) writev(r0, &(0x7f00000005c0)=[{&(0x7f00000000c0)="9f8194be5ace602f096d07ff00cd66d222b97acdfe2a2ed62183ff2f26299667b70536342607000000000000009a2d83297f99b4e597f4e9fad324868e83f4745449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b37580000", 0x60}], 0x1) 11:02:12 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {0x0}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000400)={0x8, {{0x2, 0x4e22, @remote}}, 0x0, 0x5, [{{0x2, 0x4e21, @remote}}, {{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e23, @rand_addr=0x64010100}}, {{0x2, 0x4e23, @local}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x310) setresgid(r4, 0x0, 0x0) write$P9_RGETATTR(r2, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, r3, r4, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x11000000, 0x92b, 0x10001, 0x1, 0xfb, 0x4, 0x42c4, 0x2, 0x3f}}, 0xa0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000140)={0x2b, 0xa, 0x4, 0x20000, 0x2, {0x0, 0x2710}, {0x1, 0x2, 0x1, 0x1, 0xbd, 0x28, "87b5a80d"}, 0x4, 0x4, @userptr=0x1f, 0x400, 0x0, r1}) ioctl$VHOST_SET_VRING_BASE(r5, 0x4008af12, &(0x7f00000000c0)={0x3, 0xfffffffd}) setresgid(0x0, r4, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r1, 0x1, 0x0) 11:02:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r3, 0x1, 0x0, 0x0, {{}, {}, {0x11}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r3, 0x300, 0x70bd2a, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x80) r4 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0xb4, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, r3, 0x90fc047e054328f9}, 0x14}}, 0x0) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='~|\x00\x00', @ANYRES16=r4, @ANYBLOB="000328bd7000fcdbdf2503000000080004007f000001050001000000000008000400000000000500010001000000080005000a01010214000300fe8000000000000000000000000000aa2200070073797374656d5f753a6f626a6563745f723a6465767074735f743a7330000000"], 0x74}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000000) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="d0000200", @ANYRES16=r4, @ANYBLOB="000326bd7000fbdbdf250200000014000200fe8000000000000000000000000000bb2500070073797374656d5f753a6f626a6563745f723a667361646d5f6c6f675f743a73300000000008000400ac1e00012f00070073797374656d5f753a6f626a6563745f723a73797374656d645f6c6f676765725f657865635f743a733000002400070073797374656d5f753a6f626a6563745f723a70616d5f657865635f743a73300005000100010000001400060076657468305f746f5f62726964676500080005007f000001"], 0xd0}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x54, r4, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6gre0\x00'}]}, 0x54}}, 0x10) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_mreq(r5, 0x0, 0x20, &(0x7f0000000000)={@empty, @dev={0xac, 0x14, 0x14, 0xf}}, 0x8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:12 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:12 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:12 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) io_uring_setup(0xfac, &(0x7f0000000240)={0x0, 0x0, 0x8, 0x0, 0xcb}) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x4}) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000140)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0x52}, {&(0x7f00000002c0)="ee1b70acc33cf6342b523a9cb70be0c975ad62603dad21998f7f7eadb6bcb69b3938d84d6b2f0f25a5e8b7c507356a24056fcb507116cbe4e60035569edaf5f7dd77f30ab2f8049d345456b9b5d334d8dac6b33e86840e2b62d51d5e83e0f62f01000080000000005e7a03e50030000089c179eec70f855cf12ad7d70100000000000000d0d4c824f25502d97c7c5502d62020f2472321f0ef7858a77b6eb1d64edbe542d5bb9e7e5c68fb542e323971cd4bde764a15f8e6fdd6688eeda6048ea859de6da39d00e8064aa6a80eefe06aeefeb7adb867e768daac488d05ab187d9ba4d321886c4412eb78540032c15e72f6ca9383", 0xf4}], 0x2) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x410081, 0x0) 11:02:12 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0xf00000000000000}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x4080, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r1, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x8}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x94, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x5, 0x1, "ab"}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x15, 0x1, "d38cd853769a9a7e717234b5f6ab4eb908"}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x1c, 0x1, "853734ad0f93dc8c3d8d111c416acf8fee5f8601d095a763"}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x9ef}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x4}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0xc, 0x6, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x8, 0x2, 0x9}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x1a, 0x1, "d4639d3dd3eef6df887e90f591ab2fe572009d0ad49a"}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x12, 0x1, "80d2f1c9434bd383dd763655737d"}]}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0xfffffffb}, @NL80211_ATTR_SCAN_FREQUENCIES={0x14, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x8001}, {0x8, 0x0, 0x4}]}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x8}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x5c, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x8, 0x1, "dee9711b"}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x1c, 0x6, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x8}, @NL80211_BAND_5GHZ={0x8, 0x1, 0x569}, @NL80211_BAND_60GHZ={0x8, 0x2, 0x101}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x15, 0x1, "bd2baf86f11237ce360fcaf6c145cd606b"}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x14, 0x6, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x8, 0x0, 0xc211}, @NL80211_BAND_60GHZ={0x8, 0x2, 0x28}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x7}]}]}, 0x130}, 0x1, 0x0, 0x0, 0xc080}, 0x20044815) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000000000)) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:12 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000000)={0x3a, @dev={0xac, 0x14, 0x14, 0x25}, 0x4e23, 0x3, 'fo\x00', 0x4, 0x87, 0x6a}, 0x2c) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) 11:02:12 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:12 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:12 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0x7f00}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:12 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900", 0x12}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:12 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@get={0x1, &(0x7f0000000000)=""/220, 0xb31}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r4, 0xc010640c, &(0x7f0000000000)={0x4}) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RGETATTR(r8, 0x0, 0xffffffffffffff76) 11:02:12 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900", 0x12}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:12 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:13 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900", 0x12}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:13 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0xfd, 0x0, 0x0, 0xff, 0x1000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40487ee2c368bb34, @perf_config_ext={0x10000000000000, 0x80000001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f0000000100)=0xfffffffffffffff7) setresgid(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x394) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:13 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0x1000000000000000}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) r1 = syz_open_dev$dri(&(0x7f0000000580)='/dev/dri/card#\x00', 0x1, 0x20201) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) fcntl$addseals(r1, 0x409, 0xd) r2 = getpid() r3 = getpid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000001e00)={0x0, 0x1, 0x14, 0xd, 0x47, &(0x7f0000001a00)="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"}) sched_setscheduler(r4, 0x5, &(0x7f00000002c0)=0xa) sched_setscheduler(r3, 0x5, &(0x7f00000002c0)=0x3) process_vm_writev(r2, &(0x7f0000000400)=[{&(0x7f0000000140)=""/184, 0xb8}, {&(0x7f0000000200)=""/238, 0xee}, {&(0x7f0000000300)=""/230, 0xe6}, {&(0x7f00000000c0)=""/11, 0xb}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x5, &(0x7f0000001980)=[{&(0x7f0000000480)=""/226, 0xe2}, {&(0x7f0000001600)=""/133, 0x85}, {&(0x7f00000016c0)=""/97, 0x61}, {&(0x7f0000000580)}, {&(0x7f0000001740)=""/141, 0x8d}, {&(0x7f0000001800)=""/78, 0x4e}, {&(0x7f0000001880)=""/245, 0xf5}], 0x7, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/snd/seq\x00', 0x101) ioctl$TCFLSH(r0, 0x540b, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) 11:02:13 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:13 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a680889", 0x1b}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:13 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSYMLINK(r2, &(0x7f0000000240)={0x14, 0x11, 0x1, {0x1, 0x4, 0x3}}, 0x14) write$UHID_CREATE2(r2, &(0x7f0000000080)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0x2d, 0x4, 0xfffff57b, 0x20, 0x2, 0xfffffffc, "0295b30f9ba3b4671ace72ffa25e3aa546cb40130607ad3213b5e0b16181caaaef4c95d8ae53548f05bf70fc76"}}, 0x145) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) 11:02:13 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a680889", 0x1b}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:13 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x801, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0xa0, 0x0, 0x0, 0x0, 0x8, 0x3}, 0x0, 0x0, r2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:13 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0x10}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:13 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a680889", 0x1b}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:13 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:13 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c", 0x1f}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000040)={0x2, 0x18000}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x40, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x5, r2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:13 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:13 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0x28ba047c982e379d}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0x52}], 0x1) 11:02:14 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x0) 11:02:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000240)}}, 0x10) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:14 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c", 0x1f}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b3720500efa01f9a2d83297f99b4e597f4e9fad324868e83f474b1c354491ab3174016f2a7ad445749ad710f20c51c638e6aea4a8dee825286b3", 0x52}], 0x1f6) 11:02:14 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x484300, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7, 0x7b, 0x2}, 0x7) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') 11:02:14 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x0) 11:02:14 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c", 0x1f}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 11:02:14 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0x7f00000000000000}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:14 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde", 0x21}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:14 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x0) 11:02:14 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x7f00, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:14 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde", 0x21}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:14 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 11:02:14 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde", 0x21}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:14 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 11:02:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) splice(r1, &(0x7f0000000000)=0x8, r0, &(0x7f00000000c0)=0x1ff, 0x100, 0x7) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) 11:02:14 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 11:02:14 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a", 0x22}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc6b, 0x80000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, 0x0, 0x0, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x11000000, 0x92b, 0x10001, 0x1, 0xfb, 0x4, 0x42c4, 0x2, 0x3f}}, 0xa0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setresgid(r2, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, r1, r2, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x11000000, 0x92b, 0x10001, 0x1, 0xfb, 0x4, 0x42c4, 0x2, 0x3f}}, 0xa0) getgroups(0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, r2]) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(r4, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, r5, r6, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x11000000, 0x92b, 0x10001, 0x1, 0xbb, 0x4, 0x42c4, 0x2, 0x3f}}, 0xa0) setgroups(0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, r3, r6]) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:15 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0x8dffffff00000000}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x3c]}]}, 0x48}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000001480)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x40000}, 0xc, 0x0}, 0x0) readv(0xffffffffffffffff, &(0x7f00000021c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000100)=""/145, 0x91}, {&(0x7f00000011c0)=""/193, 0xc1}, {&(0x7f00000012c0)=""/153, 0x99}], 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000140)) connect$phonet_pipe(r3, &(0x7f0000000100)={0x23, 0x4c, 0x5b, 0x9}, 0x10) write$P9_RSTAT(r3, &(0x7f00000013c0)={0x66, 0x7d, 0x1, {0x0, 0x5f, 0xff81, 0x7, {0x8, 0x2, 0x2}, 0x28040000, 0x7fffffff, 0x401, 0x0, 0x0, '', 0xa, 'net/ip_vs\x00', 0x6, 'system', 0x1c, 'ppp0securitytrusted)](vmnet1'}}, 0x66) 11:02:15 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r4, 0xc01064ab, &(0x7f0000000300)={0x100000000, 0x876, 0x5}) sendmsg$NLBL_UNLABEL_C_ACCEPT(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x80, r1, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'netpci0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private2}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:cron_log_t:s0\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0xc040) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f00000002c0)) capget(&(0x7f00000001c0)={0x20071026, r5}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) [ 2032.043855][T31310] QAT: Invalid ioctl [ 2032.177906][T31313] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 11:02:16 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}, 0xffffff7f}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:16 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a", 0x22}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:16 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0x9d372e987c04ba28}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:16 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r4, 0xc01064ab, &(0x7f0000000300)={0x100000000, 0x876, 0x5}) sendmsg$NLBL_UNLABEL_C_ACCEPT(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x80, r1, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'netpci0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private2}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:cron_log_t:s0\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0xc040) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f00000002c0)) capget(&(0x7f00000001c0)={0x20071026, r5}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:16 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a", 0x22}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) [ 2033.262544][T31332] QAT: Invalid ioctl 11:02:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x4240, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x48, &(0x7f0000000300)=[@in6={0xa, 0x4e24, 0x5, @ipv4={[], [], @multicast2}, 0xa}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e24, 0x1, @empty, 0x8}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000240)={r6, @in6={{0xa, 0x4e23, 0x5, @mcast2, 0xfff}}, 0xffff, 0x23}, &(0x7f0000000180)=0x90) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0x7) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:16 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:16 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:16 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0xf0ffffff00000000}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_crypto(r4, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=@upd={0x110, 0x12, 0x1, 0x70bd2c, 0x25dfdbfc, {{'rfc7539(ecb-serpent-avx,wp512-generic)\x00'}, [], [], 0x2000, 0x400}, [{0x8, 0x1, 0x1}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0xfffffff9}, {0x8, 0x1, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x4000}, 0x18000) dup2(r2, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:16 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:17 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:17 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) 11:02:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$P9_RGETATTR(r6, 0x0, 0xffc7) 11:02:17 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:17 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r4, 0xc01064ab, &(0x7f0000000300)={0x100000000, 0x876, 0x5}) sendmsg$NLBL_UNLABEL_C_ACCEPT(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x80, r1, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'netpci0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private2}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:cron_log_t:s0\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0xc040) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f00000002c0)) capget(&(0x7f00000001c0)={0x20071026, r5}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0), 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x2000, 0x40) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x42) renameat2(r1, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000100)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, &(0x7f0000000100)={r2, 0x8, 0xb06c, 0x84, 0x7, 0xfffff800, 0x4, 0xffffffff, 0xa39c, 0x2, 0xe4, 0x7f}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x12000, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(0xffffffffffffffff, 0xc03064b7, &(0x7f0000000000)={r2, 0x80000000, 0x3, 0x0, 0x8001, 0x8001, 0x9, 0x4, 0x74, 0x0, 0x0, 0x7ff}) 11:02:17 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0, 0xffffff7f00000000}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:18 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x52bb, 0x9, 0x7ff, 0x5, 0x6}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000100)) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 2034.603875][T31361] QAT: Invalid ioctl 11:02:18 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x4}) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f00000000c0)={{0xff, 0x7}, 'port0\x00', 0x2, 0x10000, 0x20, 0x7f, 0x1, 0x4, 0x7, 0x0, 0x5, 0x52}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r2, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) 11:02:18 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000000)) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4}) writev(r2, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07cdd1417e299667b70536342623b3a01f9a2d05000000b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0x4e}], 0x1) 11:02:18 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5270, 0x2}, 0x14200, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000000)=0xb6f, &(0x7f0000000040)=0x2) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000280)={'raw\x00', 0x5b, "d7bf86bff9d17cec0540ebb546ba75702cf70bbd2172e3f7a496de9161bfa228e9ddf72a3efeacbd41db010ad74153500fc1ed96265e9cf22fae52c4ba9e44771b71f40d8708ab651e3a2aeb4aec722bb78365c1d7195d3669c2c7"}, &(0x7f0000000300)=0x7f) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r5, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000200", @ANYRES16=r6, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x20049045}, 0x8000) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x48, r7, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffc}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffe1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4040080) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:18 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$vhost_msg(r4, &(0x7f0000000180)={0x1, {&(0x7f00000000c0)=""/149, 0x95, &(0x7f0000000600)=""/4096, 0x1, 0x4}}, 0x48) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) 11:02:18 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:18 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r4, 0xc01064ab, &(0x7f0000000300)={0x100000000, 0x876, 0x5}) sendmsg$NLBL_UNLABEL_C_ACCEPT(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x80, r1, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'netpci0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private2}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:cron_log_t:s0\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0xc040) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) r5 = getpid() capget(&(0x7f00000001c0)={0x20071026, r5}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:18 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) [ 2035.144002][T31390] QAT: Invalid ioctl 11:02:18 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9", 0x3}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:18 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x2}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:18 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r4, 0xc01064ab, &(0x7f0000000300)={0x100000000, 0x876, 0x5}) sendmsg$NLBL_UNLABEL_C_ACCEPT(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x80, r1, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'netpci0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private2}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:cron_log_t:s0\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0xc040) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:18 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}, 0xf00}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000140)) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setresgid(r5, 0x0, 0x0) write$P9_RGETATTR(r3, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, r4, r5, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x11000000, 0x92b, 0x10001, 0x1, 0xfb, 0x4, 0x42c4, 0x2, 0x3f}}, 0xa0) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setresgid(r8, 0x0, 0x0) write$P9_RGETATTR(r6, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, r7, r8, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x11000000, 0x92b, 0x10001, 0x1, 0xfb, 0x4, 0x42c4, 0x2, 0x3f}}, 0xa0) setgroups(0x6, &(0x7f0000000180)=[0x0, 0x0, r1, r2, 0x0, r8]) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:18 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9", 0x3}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:18 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9", 0x3}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) prctl$PR_GET_CHILD_SUBREAPER(0x25) setresgid(0x0, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x2200, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f00000000c0)=0x9, 0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 2035.470348][T31403] QAT: Invalid ioctl 11:02:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000100)="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", 0xff7c}], 0x4c) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0) accept4$inet(r1, 0x0, &(0x7f0000000040), 0x80800) ioctl$TCSETXW(r1, 0x5435, &(0x7f00000000c0)={0x401, 0xd000, [0x4000, 0x4, 0x200, 0x3, 0xffff], 0x6}) 11:02:19 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r4, 0xc01064ab, &(0x7f0000000300)={0x100000000, 0x876, 0x5}) sendmsg$NLBL_UNLABEL_C_ACCEPT(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x80, r1, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'netpci0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private2}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:cron_log_t:s0\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0xc040) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:19 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f8", 0x4}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:19 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f8", 0x4}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) [ 2035.793973][T31422] QAT: Invalid ioctl 11:02:19 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x3}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:19 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r3, 0xc01064ab, &(0x7f0000000300)={0x100000000, 0x876, 0x5}) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) [ 2036.183867][T31439] QAT: Invalid ioctl 11:02:19 executing program 4 (fault-call:1 fault-nth:0): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) getdents(r1, &(0x7f0000000000)=""/189, 0xbd) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:19 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f8", 0x4}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) 11:02:19 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x1, 0x0) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_IOCTL(r2, &(0x7f00000000c0)={0x20, 0xffffffffffffffda, 0x8, {0x5, 0x0, 0x6c5ad96e, 0xfffffffe}}, 0x20) ioctl$KDDISABIO(r2, 0x4b37) 11:02:19 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x0) 11:02:19 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:19 executing program 4 (fault-call:1 fault-nth:1): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x3e7, 0x3, 0x3, 0xe1, 0x0, 0x0, 0x2102a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x95}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 2036.399960][T31453] FAULT_INJECTION: forcing a failure. [ 2036.399960][T31453] name failslab, interval 1, probability 0, space 0, times 0 [ 2036.400070][T31453] CPU: 0 PID: 31453 Comm: syz-executor.4 Not tainted 5.7.0-rc6-syzkaller #0 [ 2036.400079][T31453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 11:02:20 executing program 4 (fault-call:1 fault-nth:2): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) [ 2036.400084][T31453] Call Trace: [ 2036.400106][T31453] dump_stack+0x188/0x20d [ 2036.400127][T31453] should_fail.cold+0x5/0xa [ 2036.400147][T31453] ? fault_create_debugfs_attr+0x140/0x140 [ 2036.400174][T31453] should_failslab+0x5/0xf 11:02:20 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x8}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:20 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x0) 11:02:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101080, 0x0) syz_open_pts(r1, 0x783103) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:20 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) [ 2036.400191][T31453] kmem_cache_alloc_node_trace+0x27c/0x790 [ 2036.400218][T31453] ? mutex_trylock+0x2c0/0x2c0 11:02:20 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) [ 2036.400239][T31453] __kmalloc_node+0x38/0x60 [ 2036.400256][T31453] kvmalloc_node+0x61/0xf0 [ 2036.400272][T31453] traverse+0x3b0/0x6f0 [ 2036.400287][T31453] ? mutex_trylock+0x2c0/0x2c0 [ 2036.400306][T31453] seq_lseek+0x106/0x2e0 11:02:20 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x0) [ 2036.400317][T31453] ? traverse+0x6f0/0x6f0 [ 2036.400401][T31453] proc_reg_llseek+0x2b7/0x350 [ 2036.400420][T31453] ? proc_reg_unlocked_ioctl+0x360/0x360 [ 2036.400447][T31453] ? proc_reg_unlocked_ioctl+0x360/0x360 [ 2036.400461][T31453] ksys_lseek+0x111/0x1b0 [ 2036.400483][T31453] do_syscall_64+0xf6/0x7d0 [ 2036.400503][T31453] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2036.400515][T31453] RIP: 0033:0x45ca29 [ 2036.400529][T31453] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2036.400537][T31453] RSP: 002b:00007f2c71986c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 2036.400551][T31453] RAX: ffffffffffffffda RBX: 00000000004f5600 RCX: 000000000045ca29 [ 2036.400559][T31453] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 2036.400567][T31453] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2036.400575][T31453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2036.400584][T31453] R13: 000000000000071f R14: 00000000004ca0ab R15: 00007f2c719876d4 [ 2036.564792][T31460] FAULT_INJECTION: forcing a failure. [ 2036.564792][T31460] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2036.564813][T31460] CPU: 0 PID: 31460 Comm: syz-executor.4 Not tainted 5.7.0-rc6-syzkaller #0 [ 2036.564825][T31460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2036.564831][T31460] Call Trace: [ 2036.564856][T31460] dump_stack+0x188/0x20d [ 2036.564880][T31460] should_fail.cold+0x5/0xa [ 2036.564902][T31460] ? fault_create_debugfs_attr+0x140/0x140 [ 2036.564917][T31460] ? debug_smp_processor_id+0x2f/0x185 [ 2036.564934][T31460] ? perf_trace_lock+0xeb/0x4c0 [ 2036.564961][T31460] __alloc_pages_nodemask+0x17a/0x810 [ 2036.564985][T31460] ? __alloc_pages_slowpath.constprop.0+0x2660/0x2660 [ 2036.565000][T31460] ? find_held_lock+0x2d/0x110 [ 2036.565035][T31460] cache_grow_begin+0x8c/0xc10 [ 2036.565054][T31460] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 2036.565077][T31460] kmem_cache_alloc_node_trace+0x6c3/0x790 [ 2036.565099][T31460] ? mutex_trylock+0x2c0/0x2c0 [ 2036.565122][T31460] __kmalloc_node+0x38/0x60 [ 2036.565139][T31460] kvmalloc_node+0x61/0xf0 [ 2036.565156][T31460] traverse+0x3b0/0x6f0 [ 2036.565174][T31460] ? mutex_trylock+0x2c0/0x2c0 [ 2036.565196][T31460] seq_lseek+0x106/0x2e0 [ 2036.565216][T31460] ? traverse+0x6f0/0x6f0 [ 2036.565237][T31460] proc_reg_llseek+0x2b7/0x350 [ 2036.565257][T31460] ? proc_reg_unlocked_ioctl+0x360/0x360 [ 2036.565283][T31460] ? proc_reg_unlocked_ioctl+0x360/0x360 [ 2036.565298][T31460] ksys_lseek+0x111/0x1b0 [ 2036.565319][T31460] do_syscall_64+0xf6/0x7d0 [ 2036.565340][T31460] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2036.565353][T31460] RIP: 0033:0x45ca29 [ 2036.565370][T31460] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2036.565378][T31460] RSP: 002b:00007f2c71986c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 2036.565393][T31460] RAX: ffffffffffffffda RBX: 00000000004f5600 RCX: 000000000045ca29 [ 2036.565402][T31460] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 2036.565416][T31460] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 11:02:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_RELDISP(r2, 0x5605) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) 11:02:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getresgid(&(0x7f0000000400), &(0x7f00000004c0), &(0x7f0000000500)) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) connect$rxrpc(r5, &(0x7f00000000c0)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e21, @multicast2}}, 0x24) setresgid(r3, 0x0, 0x0) write$P9_RGETATTR(r1, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, r2, r3, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x101, 0x92b, 0x10001, 0x1, 0xfb, 0x4, 0x40000000000042c4, 0x2, 0x3f}}, 0xffffffffffffffd2) setresgid(0x0, r3, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:20 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:20 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x57, 0x0) 11:02:20 executing program 0 (fault-call:9 fault-nth:0): pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:20 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x600}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) [ 2036.565426][T31460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2036.565436][T31460] R13: 000000000000071f R14: 00000000004ca0ab R15: 00007f2c719876d4 11:02:20 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x300, 0x0) [ 2037.435262][T31498] FAULT_INJECTION: forcing a failure. [ 2037.435262][T31498] name failslab, interval 1, probability 0, space 0, times 0 11:02:20 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) [ 2037.515699][T31498] CPU: 0 PID: 31498 Comm: syz-executor.0 Not tainted 5.7.0-rc6-syzkaller #0 11:02:21 executing program 0 (fault-call:9 fault-nth:1): pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 2037.515712][T31498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 11:02:21 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0xfaa, 0x0) [ 2037.515718][T31498] Call Trace: [ 2037.515741][T31498] dump_stack+0x188/0x20d [ 2037.515767][T31498] should_fail.cold+0x5/0xa [ 2037.515791][T31498] ? fault_create_debugfs_attr+0x140/0x140 [ 2037.515822][T31498] should_failslab+0x5/0xf [ 2037.515840][T31498] __kmalloc+0x2d9/0x7a0 11:02:21 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) [ 2037.515858][T31498] ? sock_kmalloc+0xb5/0x100 11:02:21 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0xfb6, 0x0) [ 2037.515878][T31498] ? shash_ahash_update+0xc3/0x110 [ 2037.515897][T31498] ? shash_async_final+0x40/0x40 [ 2037.515921][T31498] sock_kmalloc+0xb5/0x100 [ 2037.515944][T31498] hash_alloc_result.part.0+0x94/0x110 [ 2037.515961][T31498] hash_sendmsg+0x8f1/0xad0 [ 2037.515983][T31498] ? security_socket_sendmsg+0x82/0xb0 [ 2037.515998][T31498] ? hash_recvmsg+0xa80/0xa80 [ 2037.516016][T31498] sock_sendmsg+0xcf/0x120 [ 2037.516036][T31498] ____sys_sendmsg+0x308/0x7e0 [ 2037.516056][T31498] ? kernel_sendmsg+0x50/0x50 [ 2037.516071][T31498] ? __bfs+0x520/0x520 [ 2037.516104][T31498] ___sys_sendmsg+0x100/0x170 [ 2037.516124][T31498] ? sendmsg_copy_msghdr+0x70/0x70 [ 2037.516154][T31498] ? __fget_files+0x32f/0x500 [ 2037.516177][T31498] ? ksys_dup3+0x3c0/0x3c0 [ 2037.516195][T31498] ? perf_trace_lock+0xeb/0x4c0 [ 2037.516216][T31498] ? __fget_light+0x20e/0x270 [ 2037.516239][T31498] __sys_sendmmsg+0x195/0x480 [ 2037.516261][T31498] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2037.516283][T31498] ? lock_downgrade+0x840/0x840 [ 2037.516317][T31498] ? __mutex_unlock_slowpath+0xe2/0x660 [ 2037.516338][T31498] ? wait_for_completion+0x270/0x270 [ 2037.516351][T31498] ? __this_cpu_preempt_check+0x28/0x190 [ 2037.516369][T31498] ? __sb_end_write+0x101/0x1d0 [ 2037.516385][T31498] ? vfs_write+0x161/0x5d0 [ 2037.516403][T31498] ? fput_many+0x2f/0x1a0 [ 2037.516419][T31498] ? ksys_write+0x1a5/0x250 [ 2037.516435][T31498] ? __ia32_sys_read+0xb0/0xb0 [ 2037.516450][T31498] ? __ia32_sys_clock_settime+0x260/0x260 [ 2037.516469][T31498] __x64_sys_sendmmsg+0x99/0x100 [ 2037.516484][T31498] ? lockdep_hardirqs_on+0x463/0x620 [ 2037.516500][T31498] do_syscall_64+0xf6/0x7d0 [ 2037.516517][T31498] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2037.516530][T31498] RIP: 0033:0x45ca29 [ 2037.516545][T31498] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2037.516554][T31498] RSP: 002b:00007fb872b33c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2037.516568][T31498] RAX: ffffffffffffffda RBX: 00000000004fc700 RCX: 000000000045ca29 [ 2037.516578][T31498] RDX: 0000000000000002 RSI: 0000000020000f80 RDI: 0000000000000009 [ 2037.516588][T31498] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2037.516598][T31498] R10: 0000000024004880 R11: 0000000000000246 R12: 000000000000000a [ 2037.516607][T31498] R13: 00000000000008e3 R14: 00000000004cba77 R15: 00007fb872b346d4 [ 2037.735250][T31513] FAULT_INJECTION: forcing a failure. [ 2037.735250][T31513] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2037.735273][T31513] CPU: 0 PID: 31513 Comm: syz-executor.0 Not tainted 5.7.0-rc6-syzkaller #0 [ 2037.735288][T31513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2037.735295][T31513] Call Trace: [ 2037.735319][T31513] dump_stack+0x188/0x20d [ 2037.735338][T31513] should_fail.cold+0x5/0xa [ 2037.735358][T31513] ? fault_create_debugfs_attr+0x140/0x140 [ 2037.735390][T31513] __alloc_pages_nodemask+0x17a/0x810 [ 2037.735408][T31513] ? print_usage_bug+0x240/0x240 [ 2037.735424][T31513] ? __lock_acquire+0xcbb/0x4c50 [ 2037.735444][T31513] ? __alloc_pages_slowpath.constprop.0+0x2660/0x2660 [ 2037.735470][T31513] ? print_usage_bug+0x240/0x240 [ 2037.735494][T31513] alloc_pages_current+0xff/0x200 [ 2037.735515][T31513] pte_alloc_one+0x16/0x190 [ 2037.735537][T31513] do_huge_pmd_anonymous_page+0xda7/0x1990 [ 2037.735564][T31513] ? prep_transhuge_page+0xa0/0xa0 [ 2037.735581][T31513] ? pud_val+0x7c/0xf0 [ 2037.735595][T31513] ? pmd_val+0xf0/0xf0 [ 2037.735620][T31513] __handle_mm_fault+0x2cd6/0x3c90 [ 2037.735643][T31513] ? vm_insert_pages+0x6a0/0x6a0 [ 2037.735658][T31513] ? count_memcg_event_mm+0x1e2/0x3d0 [ 2037.735688][T31513] ? mark_held_locks+0x9f/0xe0 [ 2037.735714][T31513] handle_mm_fault+0x1a5/0x660 [ 2037.735738][T31513] __get_user_pages+0x7ab/0x1870 [ 2037.735769][T31513] ? follow_page_mask+0x1e30/0x1e30 [ 2037.735792][T31513] ? pmd_huge+0x150/0x150 [ 2037.735813][T31513] get_user_pages_unlocked+0x198/0x650 [ 2037.735840][T31513] ? get_user_pages_locked+0x720/0x720 [ 2037.735859][T31513] ? mark_held_locks+0x9f/0xe0 [ 2037.735882][T31513] internal_get_user_pages_fast+0x44a/0x4e0 [ 2037.735902][T31513] ? __get_user_pages_fast+0x3d0/0x3d0 [ 2037.735930][T31513] get_user_pages_fast+0x49/0x70 [ 2037.735953][T31513] iov_iter_get_pages+0x29f/0x10c0 [ 2037.735978][T31513] ? csum_and_copy_to_iter+0x13d0/0x13d0 [ 2037.735990][T31513] ? memcpy+0x39/0x60 [ 2037.736009][T31513] ? vmac_update+0x1aa/0x230 [ 2037.736033][T31513] af_alg_make_sg+0x98/0x400 [ 2037.736050][T31513] ? shash_ahash_update+0xc3/0x110 [ 2037.736070][T31513] ? af_alg_release+0x110/0x110 [ 2037.736090][T31513] ? af_alg_free_sg+0xa8/0x2f0 [ 2037.736111][T31513] hash_sendmsg+0x45c/0xad0 [ 2037.736133][T31513] ? security_socket_sendmsg+0x82/0xb0 [ 2037.736149][T31513] ? hash_recvmsg+0xa80/0xa80 [ 2037.736170][T31513] sock_sendmsg+0xcf/0x120 [ 2037.736190][T31513] ____sys_sendmsg+0x308/0x7e0 [ 2037.736211][T31513] ? kernel_sendmsg+0x50/0x50 [ 2037.736231][T31513] ? __lock_acquire+0x2184/0x4c50 [ 2037.736260][T31513] ___sys_sendmsg+0x100/0x170 [ 2037.736275][T31513] ? debug_smp_processor_id+0x2f/0x185 [ 2037.736302][T31513] ? sendmsg_copy_msghdr+0x70/0x70 [ 2037.736333][T31513] ? find_held_lock+0x2d/0x110 [ 2037.736349][T31513] ? __might_fault+0x11f/0x1d0 [ 2037.736368][T31513] ? ksys_dup3+0x3c0/0x3c0 [ 2037.736386][T31513] ? lock_downgrade+0x840/0x840 [ 2037.736399][T31513] ? perf_trace_lock+0xeb/0x4c0 [ 2037.736434][T31513] __sys_sendmmsg+0x195/0x480 [ 2037.736456][T31513] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2037.736472][T31513] ? lock_downgrade+0x840/0x840 [ 2037.736507][T31513] ? __mutex_unlock_slowpath+0xe2/0x660 [ 2037.736527][T31513] ? wait_for_completion+0x270/0x270 [ 2037.736540][T31513] ? __this_cpu_preempt_check+0x28/0x190 [ 2037.736560][T31513] ? __sb_end_write+0x101/0x1d0 [ 2037.736576][T31513] ? vfs_write+0x161/0x5d0 [ 2037.736594][T31513] ? fput_many+0x2f/0x1a0 [ 2037.736611][T31513] ? ksys_write+0x1a5/0x250 [ 2037.736627][T31513] ? __ia32_sys_read+0xb0/0xb0 [ 2037.736644][T31513] ? __ia32_sys_clock_settime+0x260/0x260 [ 2037.736672][T31513] __x64_sys_sendmmsg+0x99/0x100 [ 2037.736689][T31513] ? lockdep_hardirqs_on+0x463/0x620 [ 2037.736709][T31513] do_syscall_64+0xf6/0x7d0 [ 2037.736730][T31513] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2037.736743][T31513] RIP: 0033:0x45ca29 [ 2037.736760][T31513] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2037.736769][T31513] RSP: 002b:00007fb872b33c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2037.736784][T31513] RAX: ffffffffffffffda RBX: 00000000004fc700 RCX: 000000000045ca29 [ 2037.736794][T31513] RDX: 0000000000000002 RSI: 0000000020000f80 RDI: 0000000000000009 11:02:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000100)=0x40, 0x4) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x0) ioctl$KDGKBTYPE(r3, 0x4b33, &(0x7f00000000c0)) 11:02:22 executing program 0 (fault-call:9 fault-nth:2): pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:22 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:22 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0xfbe, 0x0) 11:02:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000040)="019adebd160cd579eec51d1180003ba774faa9005b877a4e21", 0x9, r1) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x374) setresuid(0xffffffffffffffff, 0x0, r3) ioprio_get$uid(0x3, r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$chown(0x4, r1, r3, r5) 11:02:22 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0xf}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) [ 2037.736802][T31513] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2037.736812][T31513] R10: 0000000024004880 R11: 0000000000000246 R12: 000000000000000a [ 2037.736822][T31513] R13: 00000000000008e3 R14: 00000000004cba77 R15: 00007fb872b346d4 11:02:22 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0xfc6, 0x0) 11:02:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0xe26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000140)=0x14) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x40000000001, 0x812800) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x12}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000080)={0x9c0000, 0xaba9, 0x2, r2, 0x0, &(0x7f0000000040)={0x9909de, 0x101, [], @string}}) r4 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r4, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r4, 0xc01064ab, &(0x7f0000000180)={0x5, 0x7, 0x1}) ioctl$MON_IOCQ_RING_SIZE(r3, 0x9205) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 2038.875100][T31529] FAULT_INJECTION: forcing a failure. [ 2038.875100][T31529] name failslab, interval 1, probability 0, space 0, times 0 [ 2038.913866][T31529] CPU: 1 PID: 31529 Comm: syz-executor.0 Not tainted 5.7.0-rc6-syzkaller #0 [ 2038.922644][T31529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2038.932719][T31529] Call Trace: [ 2038.936027][T31529] dump_stack+0x188/0x20d [ 2038.940377][T31529] should_fail.cold+0x5/0xa [ 2038.944939][T31529] ? fault_create_debugfs_attr+0x140/0x140 [ 2038.951560][T31529] should_failslab+0x5/0xf [ 2038.956009][T31529] kmem_cache_alloc+0x29b/0x740 [ 2038.960974][T31529] ? print_usage_bug+0x240/0x240 [ 2038.965959][T31529] ptlock_alloc+0x1d/0x70 [ 2038.965980][T31529] pte_alloc_one+0x68/0x190 [ 2038.966003][T31529] do_huge_pmd_anonymous_page+0xda7/0x1990 [ 2038.966031][T31529] ? prep_transhuge_page+0xa0/0xa0 [ 2038.966043][T31529] ? pud_val+0x7c/0xf0 [ 2038.966057][T31529] ? pmd_val+0xf0/0xf0 [ 2038.966083][T31529] __handle_mm_fault+0x2cd6/0x3c90 [ 2038.966105][T31529] ? vm_insert_pages+0x6a0/0x6a0 [ 2038.966117][T31529] ? count_memcg_event_mm+0x1e2/0x3d0 [ 2038.966147][T31529] ? mark_held_locks+0x9f/0xe0 [ 2038.966171][T31529] handle_mm_fault+0x1a5/0x660 [ 2038.966194][T31529] __get_user_pages+0x7ab/0x1870 [ 2038.966225][T31529] ? follow_page_mask+0x1e30/0x1e30 [ 2038.966252][T31529] ? pmd_huge+0x150/0x150 [ 2038.966279][T31529] get_user_pages_unlocked+0x198/0x650 [ 2038.966310][T31529] ? get_user_pages_locked+0x720/0x720 [ 2038.966330][T31529] ? mark_held_locks+0x9f/0xe0 [ 2038.966354][T31529] internal_get_user_pages_fast+0x44a/0x4e0 [ 2038.966373][T31529] ? __get_user_pages_fast+0x3d0/0x3d0 [ 2038.966398][T31529] get_user_pages_fast+0x49/0x70 [ 2038.966419][T31529] iov_iter_get_pages+0x29f/0x10c0 [ 2038.966443][T31529] ? csum_and_copy_to_iter+0x13d0/0x13d0 [ 2038.966454][T31529] ? memcpy+0x39/0x60 [ 2038.966471][T31529] ? vmac_update+0x1aa/0x230 [ 2038.966493][T31529] af_alg_make_sg+0x98/0x400 [ 2038.966508][T31529] ? shash_ahash_update+0xc3/0x110 [ 2038.966532][T31529] ? af_alg_release+0x110/0x110 [ 2039.100771][T31529] ? af_alg_free_sg+0xa8/0x2f0 [ 2039.100791][T31529] hash_sendmsg+0x45c/0xad0 [ 2039.100812][T31529] ? security_socket_sendmsg+0x82/0xb0 [ 2039.100827][T31529] ? hash_recvmsg+0xa80/0xa80 [ 2039.100845][T31529] sock_sendmsg+0xcf/0x120 11:02:22 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000000)=0x1e, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 2039.100863][T31529] ____sys_sendmsg+0x308/0x7e0 [ 2039.100887][T31529] ? kernel_sendmsg+0x50/0x50 [ 2039.135607][T31529] ? __lock_acquire+0x2184/0x4c50 [ 2039.135635][T31529] ___sys_sendmsg+0x100/0x170 [ 2039.135651][T31529] ? debug_smp_processor_id+0x2f/0x185 [ 2039.135674][T31529] ? sendmsg_copy_msghdr+0x70/0x70 [ 2039.135702][T31529] ? find_held_lock+0x2d/0x110 [ 2039.135723][T31529] ? __might_fault+0x11f/0x1d0 11:02:22 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0xfce, 0x0) 11:02:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000000)={0xa, {0xa, 0x4, 0x3}}, 0xa) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 2039.166113][T31529] ? ksys_dup3+0x3c0/0x3c0 [ 2039.166134][T31529] ? lock_downgrade+0x840/0x840 [ 2039.166149][T31529] ? perf_trace_lock+0xeb/0x4c0 [ 2039.166180][T31529] __sys_sendmmsg+0x195/0x480 [ 2039.166198][T31529] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2039.166213][T31529] ? lock_downgrade+0x840/0x840 [ 2039.166245][T31529] ? __mutex_unlock_slowpath+0xe2/0x660 [ 2039.166263][T31529] ? wait_for_completion+0x270/0x270 [ 2039.166277][T31529] ? __this_cpu_preempt_check+0x28/0x190 [ 2039.166295][T31529] ? __sb_end_write+0x101/0x1d0 [ 2039.166309][T31529] ? vfs_write+0x161/0x5d0 [ 2039.166327][T31529] ? fput_many+0x2f/0x1a0 [ 2039.166342][T31529] ? ksys_write+0x1a5/0x250 [ 2039.166357][T31529] ? __ia32_sys_read+0xb0/0xb0 [ 2039.166372][T31529] ? __ia32_sys_clock_settime+0x260/0x260 [ 2039.166393][T31529] __x64_sys_sendmmsg+0x99/0x100 [ 2039.166410][T31529] ? lockdep_hardirqs_on+0x463/0x620 [ 2039.166430][T31529] do_syscall_64+0xf6/0x7d0 [ 2039.166451][T31529] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2039.166464][T31529] RIP: 0033:0x45ca29 [ 2039.166482][T31529] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2039.166490][T31529] RSP: 002b:00007fb872b33c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2039.166505][T31529] RAX: ffffffffffffffda RBX: 00000000004fc700 RCX: 000000000045ca29 [ 2039.166514][T31529] RDX: 0000000000000002 RSI: 0000000020000f80 RDI: 0000000000000009 [ 2039.166523][T31529] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2039.166531][T31529] R10: 0000000024004880 R11: 0000000000000246 R12: 000000000000000a [ 2039.166540][T31529] R13: 00000000000008e3 R14: 00000000004cba77 R15: 00007fb872b346d4 11:02:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) recvfrom$l2tp(r2, &(0x7f00000000c0)=""/191, 0xbf, 0x2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) 11:02:23 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0xfd7, 0x0) 11:02:23 executing program 0 (fault-call:9 fault-nth:3): pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:23 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x9, 0x4, 0x4, 0x1000, 0xffff, {r2, r3/1000+10000}, {0x4, 0x1, 0x20, 0x3, 0x9, 0x8, "ad761698"}, 0x1, 0x3, @fd=r5, 0x8001, 0x0, r1}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setresgid(r8, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, r7, r8, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x11000000, 0x92b, 0x10001, 0x1, 0xfb, 0x4, 0x42c4, 0x2, 0x3f}}, 0xa0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000013c0)={0x78, 0x0, 0x2, {0x80, 0x2, 0x0, {0x3, 0x3, 0x1, 0x9, 0x0, 0x71c9, 0x8, 0xf9, 0x71, 0x4, 0x1f, 0x0, r8, 0x8, 0xffffffe1}}}, 0x78) recvmsg$can_j1939(r6, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001240)=""/242, 0xf2}], 0x1, &(0x7f0000000140)=""/73, 0x49}, 0x40012143) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) r9 = msgget(0x1, 0x40) msgctl$MSG_INFO(r9, 0xc, &(0x7f0000000240)=""/4096) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:23 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x10}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:23 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:23 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0xfdf, 0x0) 11:02:23 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) [ 2039.914575][T31575] FAULT_INJECTION: forcing a failure. [ 2039.914575][T31575] name fail_page_alloc, interval 1, probability 0, space 0, times 0 11:02:23 executing program 0 (fault-call:9 fault-nth:4): pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:23 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0xfe7, 0x0) [ 2039.914597][T31575] CPU: 0 PID: 31575 Comm: syz-executor.0 Not tainted 5.7.0-rc6-syzkaller #0 [ 2039.914609][T31575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 11:02:23 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) [ 2039.914615][T31575] Call Trace: [ 2039.914639][T31575] dump_stack+0x188/0x20d [ 2039.914663][T31575] should_fail.cold+0x5/0xa [ 2039.914689][T31575] ? fault_create_debugfs_attr+0x140/0x140 [ 2039.914721][T31575] __alloc_pages_nodemask+0x17a/0x810 [ 2039.914745][T31575] ? __alloc_pages_slowpath.constprop.0+0x2660/0x2660 [ 2039.914772][T31575] ? print_usage_bug+0x240/0x240 [ 2039.914788][T31575] ? __phys_addr+0x9a/0x110 [ 2039.914811][T31575] alloc_pages_current+0xff/0x200 [ 2039.914830][T31575] pte_alloc_one+0x16/0x190 [ 2039.914852][T31575] do_huge_pmd_anonymous_page+0xda7/0x1990 [ 2039.914879][T31575] ? prep_transhuge_page+0xa0/0xa0 [ 2039.914892][T31575] ? pud_val+0x7c/0xf0 [ 2039.914905][T31575] ? pmd_val+0xf0/0xf0 [ 2039.914929][T31575] __handle_mm_fault+0x2cd6/0x3c90 [ 2039.914952][T31575] ? vm_insert_pages+0x6a0/0x6a0 [ 2039.914968][T31575] ? count_memcg_event_mm+0x1e2/0x3d0 [ 2039.915000][T31575] ? mark_held_locks+0x9f/0xe0 [ 2039.915025][T31575] handle_mm_fault+0x1a5/0x660 [ 2039.915049][T31575] __get_user_pages+0x7ab/0x1870 [ 2039.915085][T31575] ? follow_page_mask+0x1e30/0x1e30 [ 2039.915113][T31575] ? pmd_huge+0x150/0x150 [ 2039.915140][T31575] get_user_pages_unlocked+0x198/0x650 [ 2039.915168][T31575] ? get_user_pages_locked+0x720/0x720 [ 2039.915190][T31575] ? mark_held_locks+0x9f/0xe0 [ 2039.915220][T31575] internal_get_user_pages_fast+0x44a/0x4e0 [ 2039.915237][T31575] ? __get_user_pages_fast+0x3d0/0x3d0 [ 2039.915261][T31575] get_user_pages_fast+0x49/0x70 [ 2039.915281][T31575] iov_iter_get_pages+0x29f/0x10c0 [ 2039.915304][T31575] ? csum_and_copy_to_iter+0x13d0/0x13d0 [ 2039.915317][T31575] ? memcpy+0x39/0x60 [ 2039.915335][T31575] ? vmac_update+0x1aa/0x230 [ 2039.915358][T31575] af_alg_make_sg+0x98/0x400 [ 2039.915373][T31575] ? shash_ahash_update+0xc3/0x110 [ 2039.915394][T31575] ? af_alg_release+0x110/0x110 [ 2039.915414][T31575] ? af_alg_free_sg+0xa8/0x2f0 [ 2039.915435][T31575] hash_sendmsg+0x45c/0xad0 [ 2039.915456][T31575] ? security_socket_sendmsg+0x82/0xb0 [ 2039.915471][T31575] ? hash_recvmsg+0xa80/0xa80 [ 2039.915491][T31575] sock_sendmsg+0xcf/0x120 [ 2039.915510][T31575] ____sys_sendmsg+0x308/0x7e0 [ 2039.915531][T31575] ? kernel_sendmsg+0x50/0x50 [ 2039.915550][T31575] ? __lock_acquire+0x2184/0x4c50 [ 2039.915577][T31575] ___sys_sendmsg+0x100/0x170 [ 2039.915590][T31575] ? debug_smp_processor_id+0x2f/0x185 [ 2039.915609][T31575] ? sendmsg_copy_msghdr+0x70/0x70 [ 2039.915640][T31575] ? find_held_lock+0x2d/0x110 [ 2039.915655][T31575] ? __might_fault+0x11f/0x1d0 [ 2039.915673][T31575] ? ksys_dup3+0x3c0/0x3c0 [ 2039.915690][T31575] ? lock_downgrade+0x840/0x840 [ 2039.915704][T31575] ? perf_trace_lock+0xeb/0x4c0 [ 2039.915739][T31575] __sys_sendmmsg+0x195/0x480 [ 2039.915761][T31575] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2039.915778][T31575] ? lock_downgrade+0x840/0x840 [ 2039.915812][T31575] ? __mutex_unlock_slowpath+0xe2/0x660 [ 2039.915831][T31575] ? wait_for_completion+0x270/0x270 [ 2039.915842][T31575] ? __this_cpu_preempt_check+0x28/0x190 [ 2039.915858][T31575] ? __sb_end_write+0x101/0x1d0 [ 2039.915874][T31575] ? vfs_write+0x161/0x5d0 [ 2039.915893][T31575] ? fput_many+0x2f/0x1a0 [ 2039.915910][T31575] ? ksys_write+0x1a5/0x250 [ 2039.915927][T31575] ? __ia32_sys_read+0xb0/0xb0 [ 2039.915943][T31575] ? __ia32_sys_clock_settime+0x260/0x260 [ 2039.915964][T31575] __x64_sys_sendmmsg+0x99/0x100 [ 2039.915980][T31575] ? lockdep_hardirqs_on+0x463/0x620 [ 2039.915997][T31575] do_syscall_64+0xf6/0x7d0 [ 2039.916017][T31575] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2039.916030][T31575] RIP: 0033:0x45ca29 [ 2039.916046][T31575] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2039.916055][T31575] RSP: 002b:00007fb872b33c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2039.916070][T31575] RAX: ffffffffffffffda RBX: 00000000004fc700 RCX: 000000000045ca29 [ 2039.916086][T31575] RDX: 0000000000000002 RSI: 0000000020000f80 RDI: 0000000000000009 [ 2039.916093][T31575] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2039.916100][T31575] R10: 0000000024004880 R11: 0000000000000246 R12: 000000000000000a [ 2039.916107][T31575] R13: 00000000000008e3 R14: 00000000004cba77 R15: 00007fb872b346d4 [ 2040.222532][T31589] FAULT_INJECTION: forcing a failure. [ 2040.222532][T31589] name failslab, interval 1, probability 0, space 0, times 0 [ 2040.628154][T31589] CPU: 0 PID: 31589 Comm: syz-executor.0 Not tainted 5.7.0-rc6-syzkaller #0 [ 2040.636850][T31589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2040.646932][T31589] Call Trace: [ 2040.650246][T31589] dump_stack+0x188/0x20d [ 2040.654599][T31589] should_fail.cold+0x5/0xa [ 2040.659124][T31589] ? fault_create_debugfs_attr+0x140/0x140 [ 2040.664958][T31589] should_failslab+0x5/0xf [ 2040.669391][T31589] kmem_cache_alloc+0x29b/0x740 [ 2040.674287][T31589] ? print_usage_bug+0x240/0x240 [ 2040.679231][T31589] ? __phys_addr+0x9a/0x110 [ 2040.683755][T31589] ptlock_alloc+0x1d/0x70 [ 2040.688803][T31589] pte_alloc_one+0x68/0x190 [ 2040.693345][T31589] do_huge_pmd_anonymous_page+0xda7/0x1990 [ 2040.699176][T31589] ? prep_transhuge_page+0xa0/0xa0 [ 2040.704297][T31589] ? pud_val+0x7c/0xf0 [ 2040.708388][T31589] ? pmd_val+0xf0/0xf0 [ 2040.712576][T31589] __handle_mm_fault+0x2cd6/0x3c90 [ 2040.717798][T31589] ? vm_insert_pages+0x6a0/0x6a0 [ 2040.722778][T31589] ? count_memcg_event_mm+0x1e2/0x3d0 [ 2040.728181][T31589] ? mark_held_locks+0x9f/0xe0 [ 2040.732971][T31589] handle_mm_fault+0x1a5/0x660 [ 2040.737942][T31589] __get_user_pages+0x7ab/0x1870 [ 2040.742914][T31589] ? follow_page_mask+0x1e30/0x1e30 [ 2040.748145][T31589] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2040.753627][T31589] get_user_pages_unlocked+0x198/0x650 [ 2040.759129][T31589] ? get_user_pages_locked+0x720/0x720 [ 2040.764713][T31589] ? internal_get_user_pages_fast+0x212/0x4e0 [ 2040.770801][T31589] internal_get_user_pages_fast+0x44a/0x4e0 [ 2040.776800][T31589] ? __get_user_pages_fast+0x3d0/0x3d0 [ 2040.782291][T31589] get_user_pages_fast+0x49/0x70 [ 2040.787342][T31589] iov_iter_get_pages+0x29f/0x10c0 [ 2040.792489][T31589] ? csum_and_copy_to_iter+0x13d0/0x13d0 [ 2040.798181][T31589] ? memcpy+0x39/0x60 [ 2040.802157][T31589] ? vmac_update+0x1aa/0x230 [ 2040.806735][T31589] af_alg_make_sg+0x98/0x400 [ 2040.811334][T31589] ? shash_ahash_update+0xc3/0x110 [ 2040.816473][T31589] ? af_alg_release+0x110/0x110 [ 2040.821318][T31589] ? af_alg_free_sg+0xa8/0x2f0 [ 2040.826073][T31589] hash_sendmsg+0x45c/0xad0 [ 2040.830569][T31589] ? security_socket_sendmsg+0x82/0xb0 [ 2040.836021][T31589] ? hash_recvmsg+0xa80/0xa80 [ 2040.840683][T31589] sock_sendmsg+0xcf/0x120 [ 2040.845083][T31589] ____sys_sendmsg+0x308/0x7e0 [ 2040.849831][T31589] ? kernel_sendmsg+0x50/0x50 [ 2040.854671][T31589] ? __lock_acquire+0x2184/0x4c50 [ 2040.859686][T31589] ___sys_sendmsg+0x100/0x170 [ 2040.864345][T31589] ? debug_smp_processor_id+0x2f/0x185 [ 2040.869791][T31589] ? sendmsg_copy_msghdr+0x70/0x70 [ 2040.874900][T31589] ? find_held_lock+0x2d/0x110 [ 2040.879652][T31589] ? __might_fault+0x11f/0x1d0 [ 2040.884401][T31589] ? ksys_dup3+0x3c0/0x3c0 [ 2040.888804][T31589] ? lock_downgrade+0x840/0x840 [ 2040.893635][T31589] ? perf_trace_lock+0xeb/0x4c0 [ 2040.898480][T31589] __sys_sendmmsg+0x195/0x480 [ 2040.903145][T31589] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2040.908413][T31589] ? lock_downgrade+0x840/0x840 [ 2040.913359][T31589] ? __mutex_unlock_slowpath+0xe2/0x660 [ 2040.918899][T31589] ? wait_for_completion+0x270/0x270 [ 2040.924181][T31589] ? __this_cpu_preempt_check+0x28/0x190 [ 2040.929803][T31589] ? __sb_end_write+0x101/0x1d0 [ 2040.934634][T31589] ? vfs_write+0x161/0x5d0 [ 2040.939055][T31589] ? fput_many+0x2f/0x1a0 [ 2040.943373][T31589] ? ksys_write+0x1a5/0x250 [ 2040.947870][T31589] ? __ia32_sys_read+0xb0/0xb0 [ 2040.952617][T31589] ? __ia32_sys_clock_settime+0x260/0x260 [ 2040.958412][T31589] __x64_sys_sendmmsg+0x99/0x100 [ 2040.963333][T31589] ? lockdep_hardirqs_on+0x463/0x620 [ 2040.968898][T31589] do_syscall_64+0xf6/0x7d0 [ 2040.973479][T31589] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2040.979364][T31589] RIP: 0033:0x45ca29 [ 2040.983288][T31589] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2041.002882][T31589] RSP: 002b:00007fb872b33c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2041.011401][T31589] RAX: ffffffffffffffda RBX: 00000000004fc700 RCX: 000000000045ca29 [ 2041.019361][T31589] RDX: 0000000000000002 RSI: 0000000020000f80 RDI: 0000000000000009 [ 2041.027429][T31589] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2041.035471][T31589] R10: 0000000024004880 R11: 0000000000000246 R12: 000000000000000a [ 2041.043427][T31589] R13: 00000000000008e3 R14: 00000000004cba77 R15: 00007fb872b346d4 11:02:24 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597d4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482b04b4179b3758", 0x52}, {&(0x7f0000000240)="c569e651227c560fce54d7aed265a494c7b34585f448c001b6a7168984e11de0e248229c5e77ea44f501b54ccd171dc9f8cc0f5edab08655e96ce12149ff245a649c6491a13b6bf96a14a382e3b1726ef9864892d87d3708ff75dac856603f103aac79db2e036cbc18cf920d9d195e41d479783e3edf953bd4637753d7b5965d283be93f2697b29d5696d1931c6d199c33317238867c6482c7bb8d170a8abadbbb1a25cc383345411781ccc2fdaf874c2798891f63a71ccaed8a9bd6cb3ff365bb6ace28c47707f5dbe1deb45cc59dbf12b0fe63d0d352677563fdc3677dd488e18841a44599000000000000000000", 0xffffffffffffff64}, {&(0x7f0000000180)="60c427668c1f87125f9286789a110afec83ea21e22ffeeed34162c2c023df424a82b3ec1cbf4e3f2fa5b86eb057dd25d9a41059c01b245b09bab2cc1ee56fb095ed3b637a1b0f06251f1ab8673d273500d70c1d27114ed3fbd4925a9214a1fb1bc321f2c3075c7da71560bfdf7c6701b2a8a50eb458e4e944d8a5d831f0b660f3f2e6358c84e9fd1540620934795ba11d06c557596fe2637d4dbce9019d8008264b52e6ce2aa7f157f8c6fcdd18b25216340499ffa", 0xb5}, {&(0x7f0000000840)="59a9d9cd26a1c10701b122ad9d5a5afe94c4ff5e3aae9b75c92f16adaa7b07030c6a8e8adfc63b496000bd879058323b3c7d8e69593f67a4a5b6d0e422c312e77f178139167984108cf4822b121ad7439497a583f0b367e417bf00ce850311c07abfb9ad177fc08bb71020a44308600e781dd1580e47205a95148bd16622019d94184900d0b86509a2bea04d6820232fb0cd18c90acecb48e2ba284f11fdcc7d2afa1d92ab530906b1931fc7f530731571706434afb514c930d76ea8a26b949898e8ef1b706a84642bc76a8c83b550cafc7cadb2d3d12862d06e2056e9a80054b182a7031020895b9cbff6e11bbf9b2765d77a651524e166713929e12f8c1a5b74b9f99752b2d5186276f032c7bfa543fa2a2b9fa0204db9436afa165a3e173e339c02e44eec8d5cf812d894b242a461a4e6a055b59ca47596fa55a8eba39feb6a2184d8e4d54e98c7da73f03deba997a7b41d282a21afd92a95dad6af008f8563d552ac4909e9be5c13f09ee454a344cd1d2e341d2b935fff770d796f122498c576a96c33e76cf6f046fe925e1f519d388f819b81c7f4d5bfc708051753d6012d0931a863caf96b27977899a019e583cdb25d31b7cd1cca7f853808ff37d387bd84846d16dac61c5adb56d767b81cd249c0c321d70153c20187971cb14dcaf1197f188b6aecc36e847fbd7695b8428de581f7f1d89c8f03a5af98c19e5d75a547555318807a57563fab8e406de353c2", 0x1ab}, {&(0x7f0000000340)="af16c071b3a84b33b90f7515d06173b51c66c8d0e1941f2835f2a420893594aa720740ac21111a0f2c8f8549472edf97d41dd410d40fd1912101732fa7e2b61d5a5e71b17cdcc61c8ffbc5e6d70fdffe9ce07d0526c25ec1134a6c97e73c2002b9f109205445091f82b86be22886f571ed2db333c9c39808ee181300ab2f7961dda552f67aace668ab5ed76fe075be3d8ef1a29242490caadd1e8e8bc665d481138723597cebc09d4e8948808c1c970035f983c3c6352eafda3a8536e64589b69786d623329d9686a21feb12b7c2761bbedf6f930e5abc2de0a2cbbb97ef45d3618df8f0fe5a5de5fe0a62dd", 0xec}], 0x1000000000000129) 11:02:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3e7, 0x0, 0x7, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x374) setresuid(0xffffffffffffffff, 0x0, r2) ioprio_get$uid(0x3, r2) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f00000002c0)) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f00000002c0)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000140)={{0x2, 0x0, 0x0, r2, r3, 0x84, 0xab}, 0x0, 0x0, 0x8, 0x2, 0x1f, 0xfde, 0xac, 0x0, 0x18, 0x6, r4, r5}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8000, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:24 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0xf00}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:24 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:24 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0xff0, 0x0) 11:02:24 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2006c0, 0x0) write$P9_RLOPEN(r1, &(0x7f0000000100)={0x18, 0xd, 0x2, {{0x40, 0x3, 0x7}, 0x81}}, 0x18) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x101000, 0x0) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) 11:02:24 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0xf000, 0x0) 11:02:24 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:24 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:24 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0xfffff000, 0x0) 11:02:25 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffff000, 0x0) 11:02:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) clock_adjtime(0x0, &(0x7f0000000340)={0x7f, 0x5b, 0x11, 0x7f, 0x9, 0x9, 0xffffffff, 0x8, 0x5, 0xffffffff80000001, 0x100000001, 0xa0f6, 0x4, 0x3ff, 0x8, 0x2, 0x5, 0x0, 0x1000, 0x9, 0xe3a7, 0x5, 0x3, 0xffff, 0x1, 0x9}) setresgid(0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_SCAN_SUPP_RATES={0xc, 0x11d, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x8, 0x0, "b9e9703b"}]}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x60, 0x0, 0x800, 0x70bd27, 0x25dfdbfd, {}, [@NL80211_ATTR_SCAN_SSIDS={0x1c, 0x2d, 0x0, 0x1, [{0xe, 0x0, [0xd, 0xf, 0x10, 0xb, 0x7, 0x1f, 0x2, 0x4, 0x1a, 0x16]}, {0x8, 0x0, [0xf, 0x1f, 0x2, 0x7]}]}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x30, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0xc}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xd, 0x1, "8038a2cfb47bef8f60"}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x14, 0x6, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x8, 0x3, 0x1}, @NL80211_BAND_2GHZ={0x8, 0x0, 0x8001}]}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4040000) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000180)=0x1000) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:25 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x7f00}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:25 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:25 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:25 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x2) 11:02:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) r1 = dup(0xffffffffffffffff) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000000)=0x49c3) 11:02:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001340)='nl80211\x00') sendmsg$NL80211_CMD_DEL_INTERFACE(r2, &(0x7f0000001400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x24, r3, 0x100, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x47}, 0x4000881) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) r4 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000080)={r4, 0x1000, 0xe1}, &(0x7f0000001440)=ANY=[@ANYBLOB="656e633d0080ffffffffffff000000000069630000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084fdb6a1c768a8d89edb97a913eeec"], &(0x7f0000000240)="e05b92c9b69b76040e6dee9835d454de663755e044159c3f3e69b150345442b5c35dbfa7fb55df53962af510f84bc61647e9d55f25a999c7df72229aab5e288450ee30d13041eb9bdf57f44f214ad056af8f33bc5b82ae6bd5098682b06a95eb86163c15a3c5bc8308930ebc3abbfc742c8ae84adfa82b962d769e63cc2759dd5ee7cec23eccf72c26c91bcab892b1e025c23ccf05d6c49074155e06141fe26edc29b3a8c769759cc3a1508041776c1d3a9dc744d61669577519fb40071c052de557262afeb688c2922a7cd37c72ad758ecc86de1f9b0876b411545e0b50b79af945919728407cc6a4e24abfb7dcacaf058bf3884fca69951c657ce4b95f473d2a488e673b7b119313c4002ab0b636f8cafd99c5ac42132e9d6858e32ddc1917e214870a5d4b7ae30bde3ce48485188d44dc5efb550c008da00393b70c82aac77f69a5e1777b9b19008142d6159bee89dcb30ea88a63cc2c8017a363fb8aa428898b1eb82250870f6086f78ee671fbbe1536dce1b25e61ead118d21bd6890dd66fe7f4a54f02b5172130f394ab781579fc55e4db248f34f32022b491d48d09e109ae3e8b8afd1d9250c269ea3155e4dbe681ca52985d36bc6f99b66b53da38b13c48be24676de5f5cd8846b6d91ee184d23cfa6eaa6c7e8af6835f1669068e975059361c9d9bcd798341ba531ce7508de7755b4b7e3f452dd7abf25f6969797f702cf18b8eb9db0b513215476c1fabc416d7fa427e62c298e4b297dbde2aeed4d24b7261fa8f70f2e14f994eba066c848f1b070c86b3f2277e60294874e539368f68e4155b01153cde568b8ce21f8df0bc1697d1d322726ca98fd7525eec76cee46e7dc4430167db996fb0d93850680a60de6b62cdbe8fc57912d62be22827be1cd4ddd73692b1f814c729cb669da054c04546194fe8ca948a43cb9ef2d4fc65682d27151d102b144a1471d6dba5e3b8703c6b9a0e3869f29cd7451954c6416bf122966e1855e03f4f7d55f126504f653c25929dcc9303126c6bec13de33fb3f6ca0ff383aa198a453114e17a81be7b4598c293cf2622c428fe148cf73ff552cb69a1d22b5f4db08cf282c33d7d586b31d3871c8a2f71150254d731c64714c901b3d01f8f8072454c26186134e8c9f7ca1592a92fd0205250336aea59e72a066ca20b2304c037a960ac920e12420943fc183f033dfc59632a15b3a45eb295db8394b7ed24ce5b68530a9ba880895e441cc7d342906572f0443f153deb551674a1ee7e9c8ae47a29ba4b5f75bb0fab66b9b7acf33e4361f52fca77f354d10641fbe6527be94ea02cb16cd19e13ae05ed81976d5b178e93cac2bee786c607fcd6c448ff48dea9548ca7993652b8b508556a1ce0349cc7a40b25822982c7b3327bf4c30cbe2a081aa24435fff988bf3acf895507c23c86f95b9c608a323a4b2fdf0629818b3390ff47d05f9cc792457da3cad81edb680ebb04ba286937f0e0f87c3fbdb5cd83587edded96c044c3a45f51ecd16abab6577911bd82277ef1add24efd6d875c72dca7c8867bd89cb8ceeff87db266c317091315142fc28894a9e9f056bb30f7eecbbd1e865b6a3a76496ee738f338efc350f7e9b38c78599b2f669b78d3edf2eb877491154dd3f0ee421d6f76626f46f7ca06f21fbcdfe6b41ea3146d37f902b34fa72fea888336155db0121365536fae10757ab5bed1f78cdb0ae4247963a19b3e0c5d51bdcc7b0bdc88a2d4baff1c24c7a5bc1dd50be4753b20fa12a7ea53adb7e73547a81eefeca1b88e70592491aca6b1635680efef16d88591525bc659934f383dfcd37de7ec8886b6e2dcd3226eba30291544a13214066c2cc5e43ef050c602b00c8f777b9cf5e74c3e98e79296b3899594ac67fe27f368561bfcc4fe64dfe1be42d2739200a01917e7bff14682a5a0d0c6aaf8cfccae21ab522f84821254c9a017a6e30ff5fd051bc3ddc7bb176fe0bf636d8d30718b02609b0902c87045a6440fcbedbd42552720b11b7d0dc31bd9c4c470382de808587a11718574073f63779eb1bae238cd629f3c9c4b26ff1cb2c145ae2cd1f8bb2933a6cb42883e0978d87551576270db2f27ac07bc04071e2e409c76eba7c022513a91534779f0aef15ff77d4ac6f420a1eaa1cfab18970fbd06ffcf9b73b0f2e3a464c2c51de05cc362c0281ef38d2cb61738bfb6ede83709fafce46a43efe96f5affd225b1cbb336e7c24b9759e71c5bc649a628dbb804c1383236124f2edf71dc0f3b4701aab165ddcb9495f0bd62c2e1ab23cef1855e2b7e1edd04aded308f1f41694b24e781fd712053629b154a51ec8360fafc80dd6973d870dee3e0ee7944d9899b5b03964dce5633a250e4d0ecff4205c3c92fe96753d6274adf5b1494148e3877ffea7ad46030ad0cf0fcd7f0d63c7834ac7d2a547797513a5f8c12cdb95a6d9439f2bc2b392cbfd8a31b57926226efab15d935e32c54edbaf291d76697fb99faa79b7bbf439e6077d9f9ed81c79cf09a4f340791111cc7540ed597350f22aac26e684e3f978f72f5b0c17114f709c832632e65c78911a21fabce9810da80ac51521be4946bb8b95f6610789c3405eefe4a89617f54bcde301c9518067e7e33f9c683af3a08d041160ee0e75de22533dce3b86c14bc5eab83bcc932f4154d618d6230bd9c28519cb4f13673f761fc248ba9ef17ab02b5d1857691717717d0c2515bb2938d76035ffc7be9c83aa7ddc12c321e9d2bd27abe21ca544d2708fc06f428990197ba3649c95b8f642c7bd47f7f0a959b4b9b0b397cd99f2e7352f5b0fa570136da6c2e8a51305c913e91872228bb99d37b9e96b9e05a2e2dc83d7b39b81b6b8f79f2f832aafd47c90827b368a7cdb3754073b3c68e5fd2426793492264a18ea77f3fc2d7b98ccc382671ab6dd1c17b1b0f8535bc54fe6bfaa4cbc25c40707c973e3cea79149076edcfcce24ca068604a3520e2a4612f8871a32d975d68fef98ac166c1f795243d36f2b83e294c90d640a629d87bb4d6f1d48bc2b4ea41cd408bced4e47daf10e97f4a2cd4f44f65994ab8990cbbe094ea95cee73411e6576d160f7d4e5d2b7c82ed47b0bdf99e195073dbbfac159f2b5b5ba439e314c2d6e3847af77700aedf2d272ec23cbb087976c48fb6874af7b68c0e837de51f94568c830c7bfe7dc49213e11b06c3f0bd8b246abaa2dd0d6e422ec5e6082b227d3c41d7a1c1c2490ac52b1b2d1a333ef2d7f4c2d3502a3311f611ebdd86502b68823897d58120c0b78b37d318940b8dcee1dbd32f16810d3745af89e170ef3fa7d47d96443c351e5f60560e6cdbbb6d6229b66fc3832aa56ba667ed85bb56dce44bd41f8dc3815a7e5b1d1a39301e319cacf68a9bee3e15f67abb724625630087a4df15d835acce3c864816db958ae75d60230804d086f4196db8fa59dac926465b5a2db671426c21f10d76d9d4d6326c6fc8dc7abc4b7e69c084995bb5e4b7c021b88a8cbc00c2147002a93dd96dc0087b32f830c9a2facd7812214c6c23ba1d493712ecd1433c3c2e2a73707f9260c9737e3785c24d73e456039b08ebc9254c602eb1e0bdf2d989581a597db3d957549bc97dba1c8ff4136f125224191137578be98c7d0999f39e915a4e67b205cf35fe1d7432e0ba9d9a56a9ab361e5505d4c028a63f4d90e23d83d6de2b78a307fb31b7f934eae625788d9e1e3bd8056378cda92062bbb5c5a2b36f70053923fe9aa7b12493319a1fba50ad84ad726282e31b4465ca5eb5e7a2c2b2e1e3e19344c1f2cfee9b1de1f1cc9880ece29df1db67da075144ff599b84904b78b73c17798eb6958f4e9925b39bba62b09471223f2155ea8a433cb3e0929707875199df315896626eb45527c59916549e6be2c3af8d48f701dd1547421bb6f76c5e1160631fb683ffabf99d23d116b3e96aa48188c826997da4d42f78f077434b4bb6e5573e9ce3fa618cc381f4d4b3ce8350d89c2e38103475312d3ed33096311460d419a0de406942f45491aa2aafddbc4cd1aa15b28129f0215e8f2fbe47c4b1fa0f0291093ad3491c4b0f345c49bce6469b10444d1969bb0733f0fa93a8bb286f06f84b7d908c808cfec7cbb4af4cf655649c80d33f86a5c3f2519ae233b618b8f03174beee638c4b5bed2d425ca462c3213b194f99041ad03c416212a6edb89e0b54051e49cae47f94b541fc8dc1341e190bb562d61352dff3a41ea8c4abf0b2a2ceec17e086687152ba5b5e194dacc49a56e627ac4a945123544bd12d2033f6da211fb0510be2541960afc4a141372737b6ce79e43a70fe65bf24de9d9dce30d6ede881030429f04289397510af01307ea578f71770a6724ed801f78de197f120d1176130410e183bfaa6e561d2ad381af152e7e13d4a962080bfc4ae104d5ebd9b2d93ea06fc3da532e5334950b07b1f4b72bfbb1b814be5d4574eb5b770bf9defac0dcad3864afb47500ce5dcd449966e84250a0d961a708d6915f3070f0c249a8a9e47627760619cb8449d69d47dced5019d552db11d3d99710420781d05db1c6cc138ddff00f5a4def030d2b5ce017421be4eac869a453768b17c82fa681cb3b376876954ecefadf4bc3d722e533595da308daae52e68f57d0e3ffd2f40096c59a61647688652fffcccce0fbe25c241fb1711a60b3befadf0fb4d688d5e90c66d53f932d396a1f169978f220ee0700833d31b4640edd0e520310c6248e071c74beb65dbd5de37e7fe5695f9d46ba0be2a1e630d66456a47a19e41bfe40dab3ab7e6e79d36e7ca01a773be08c4ded785c1b7019edb1ba695ba288e950795d25de866ba2ca854cddaa90b1d3918495bcc27cc423004b379ce87f64e0a3da863473cd49e4d01eabc2ab818f3af53d0a64a4d0bc83793c5ef915af0194f63d3705fde3c60ae3a0c1c61e5bac116bea8261f59863af3d522f1e04887ab6931ccc64cf1b23acf39856200fc07fe72e86ef49d86e30d3d3d473e8a903872463b1e84ba44c89409f6410b9647c9a2a2c0407b12bbf2ba311794d7b50293ba86adb989c75034e1f6259fe131aa7ebc7176966a562933774c02c73ac0aa3e437fd4b1af5c20246973b793982c33398eb936e34757fef8260a3d093283c91b86c9e0be8cb06e8b1a55618fb61a1c52ef88d72bc469a4ac21588b9ca6fed035117c49abccc006c4cb3b8f2d94e01acad79fd5864b5b550fd7509ef73cdfd236fcb53a392a633d580d405830ae20a3e9c8eb3258a9b63f2e11e8e3327b7bef5629410e117bc3de3712b4753908c4c4a440c9ca732ef31f9957f1ea1fd073b09b7231d65c97d22d1459b14ec07a51fd3e547fa2d83b5a71fbcfd0e9ba12cb16ef1f0d7f0cf97f3bde55749d9ee3e6df3da246b3f9f38647a9f6552723da7c9a7831bfa8ab6ce7e3f4c0b9321d49a6b533766054af3dbb85aee178906ad759e31701b6d9834a1dccb0accc38f2653f7ce7a061d31a47899cadcf4ea21089053a7336adf9305f90fe053f8e908ff93f50972b44efb2f087c780211581513da70559bb6cd777e221cd9ddef4ff3d9e00866f67106cc9a3f0a3120b1c195002c521173d1070474d9736badbbd3ed6df2b366820d110dae74471a0657395b2885fcef5a9bcf8ed8351ad16bb48c0ad3412ffad6efe1fd5973d8adfd5edc01bceb2fd5339586f9cd10759c9b60046b7fa898eddd49a8b2218bf9e6f546e64c89ef2483b389228061f782f1048c1bb95d4cad41a9e72de1557468af405e93a7d203ee6e87d062a3459c1c2b84820514395c0375b8ef067cec", &(0x7f0000001240)=""/225) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:25 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x43}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r2, r3, 0x0, 0x8607) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x23, &(0x7f00000002c0)={r5}, 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e22, 0x0, @local}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={r5, 0x6}, 0x8) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:25 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x3) 11:02:25 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x10001, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4}) r3 = dup2(r1, r2) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000440)={{0x1, 0x5, 0x3, 0x2, 'syz0\x00', 0x2}, 0x3, 0x200, 0x3, 0x0, 0x7, 0x7fffffff, 'syz1\x00', &(0x7f0000000080)=['/dev/dri/card#\x00', '/dev/snd/pcmC#D#p\x00', '\x00', '&GPL&ppp0\\@{!posix_acl_access\x00', '[%self\x00', '/dev/dri/card#\x00', '/dev/dri/card#\x00'], 0x65, [], [0x7ff, 0xefe6, 0xe94c, 0xfff8]}) ioctl$DRM_IOCTL_GET_CAP(r6, 0xc010640c, &(0x7f0000000000)={0x4}) syncfs(r6) statx(r5, &(0x7f0000000000)='./file0\x00', 0x4000, 0x20, &(0x7f0000000340)) 11:02:25 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x4) 11:02:25 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0xf0ff7f}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:25 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x5) 11:02:25 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0xf, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x8) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r6 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r6, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) getsockname$inet(r6, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000000)) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) 11:02:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x111, 0x23, 0x0, 0x7, 0x0, 0x3, 0xf834}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000000)={0xa, 0xfff, [{0x0, 0x0, 0x70}, {0x3, 0x0, 0x48a}, {0x0, 0x0, 0x1f}, {0xffffffe1, 0x0, 0xfffffffffffffffa}, {0x80, 0x0, 0x16}, {0x500, 0x0, 0x9}, {0x2, 0x0, 0x3}, {0x3c2b, 0x0, 0xfffffffffffffffa}, {0x6, 0x0, 0x9}, {0x7fffffff, 0x0, 0x400}]}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:26 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x6) 11:02:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x48010, 0x0, 0x0, 0x2, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) dup2(r1, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x43}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r3, r4, 0x0, 0x8607) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x23, &(0x7f00000002c0)={r6}, 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000000c0)={r6, @in6={{0xa, 0x4e22, 0x0, @local}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000040)={r6, 0x7}, &(0x7f0000000080)=0x8) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:26 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x7) 11:02:26 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x1000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RGETATTR(r2, 0x0, 0xffffffffffffffbe) 11:02:26 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x10) 11:02:26 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0xf00, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:26 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r1, 0x5441, 0x5) writev(0xffffffffffffffff, &(0x7f00000005c0), 0x0) 11:02:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000000c0)=""/177) 11:02:26 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0xf5) 11:02:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x6220, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:27 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x300) 11:02:27 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0xf000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) ptrace$setregset(0x4205, r1, 0x201, &(0x7f00000000c0)={&(0x7f0000000000)="11b7585cc27d0602f407f72d0c45f59718d162ae32b064653bdeebdaa6e12a78f012889367f6eeb5d2a6d7493e59735c88b1d9628aadcc63a926fc73f0cc082d35d9bb48e4dc89a520bcd23634183792aefff093465a88711d5250ceead90d7fc90da1441af7fb93887257d11d1a934aed7956b8d8ec803d53cd1bc53de61c5f55c26595764280976c01d280d901d9bb5cf1a0169d67c224bcfaaae81cb413afac374e4ed94c5e2cbd0ebe55c8797ca401b6b014e54596", 0xb7}) setresgid(0x0, 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:27 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x7f00, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:27 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x500) 11:02:27 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x600) 11:02:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSCTTY(r0, 0x540e, 0x4) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) 11:02:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:27 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x700) 11:02:27 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x1000000, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setresgid(r3, 0x0, 0x0) write$P9_RGETATTR(r1, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, r2, r3, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x11000000, 0x92b, 0x10001, 0x1, 0xfb, 0x4, 0x42c4, 0x2, 0x3f}}, 0xa0) setresgid(0x0, r3, r3) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:27 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x10000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:28 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0xf5ff) 11:02:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x222400, 0x0) write$dsp(r1, &(0x7f0000000240)="e8733361b2b710ea14248dddd44604620acd9e4c4ee3565732854d36592f3c37bfad8446aab94b59b4518f6b58d3a20fe79d10bdccec066cf18c9b44b046070a86d2c173c7fedf60a01bcb60a85e23f5a775dc38de4b22addfeaac3d592151b1a6ad856d221fcf511a04f7f03ee5c88e04fadb4118e5cf782e5b97d39ccd396ae49183a7b407b449a4a7b4a42200187956223b8cc614601bd9e6aa72b6ce88ee478c572d42487869efd32375b47ff3ada5328ca00a2658cfdb1b5e9073af662e4dca6edeeb6ecc7f7d2ff1b13072855062d81e47ef835540301035cf2394b1490e7631528ba0", 0xe6) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/87, 0x57) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:28 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0xfff5) 11:02:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x20, r4, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_SCAN_SUPP_RATES={0xc, 0x11d, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x8, 0x0, "b9e9703b"}]}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r4, 0x8, 0x70bd28, 0x25dfdbff, {}, [@NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x5}, @NL80211_ATTR_BSSID={0xa, 0xf5, @local}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040044}, 0x44000) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) [ 2044.963019][T31783] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:02:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f00000000c0)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0x52}], 0x1) 11:02:28 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x100000) 11:02:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:28 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0xf000000, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r6, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x8000, 0x1, 0x4, 0x10, 0x80000000, {r2, r3/1000+60000}, {0x3, 0x2, 0x80, 0x8, 0x1, 0xff, "d4920dda"}, 0x5, 0x3, @planes=&(0x7f00000000c0)={0x8, 0xffffff32, @fd=r5}, 0x32fa, 0x0, r6}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000200)={0x4009, 0x6f944ad3, 0x10000, 0x9}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r10, 0xc0884123, &(0x7f0000000280)={0x1, "1224fddbc041567a8473d668ff9abb6eed8f801cd91d0e5aace914c8231b476be79c5cfe1b5f0094a40e8c23382d1868382c13bfbda74dd8f741784eed340218", {0x7, 0x2}}) ioctl$VIDIOC_G_FREQUENCY(r7, 0xc02c5638, &(0x7f0000000240)={0x80000001, 0x2, 0x3ff}) writev(r8, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) [ 2045.318719][T31783] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:02:29 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x7f000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:29 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x1000000) 11:02:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) capget(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8}]}}]}, 0x38}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r5, 0x100, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x81}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x400c0d0}, 0x2004c001) r9 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r9, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x1ff, @private1, 0xfffff001}], 0x1c) 11:02:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88908, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1204, 0x9, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 11:02:29 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x7f000000, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:29 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x2000000) 11:02:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(0x0, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000100)) setresgid(0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x389541, 0x0) 11:02:29 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x3000000) 11:02:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(0x0, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:29 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) [ 2046.016144][T31829] FAULT_INJECTION: forcing a failure. [ 2046.016144][T31829] name failslab, interval 1, probability 0, space 0, times 0 [ 2046.016303][T31829] CPU: 0 PID: 31829 Comm: syz-executor.2 Not tainted 5.7.0-rc6-syzkaller #0 [ 2046.016313][T31829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2046.016320][T31829] Call Trace: [ 2046.016344][T31829] dump_stack+0x188/0x20d [ 2046.016369][T31829] should_fail.cold+0x5/0xa [ 2046.016391][T31829] ? fault_create_debugfs_attr+0x140/0x140 [ 2046.016422][T31829] should_failslab+0x5/0xf [ 2046.016438][T31829] __kmalloc+0x2d9/0x7a0 [ 2046.016455][T31829] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2046.016542][T31829] ? tomoyo_realpath_from_path+0xc2/0x620 [ 2046.016562][T31829] ? lock_release+0x800/0x800 [ 2046.016577][T31829] ? __lock_acquire+0xcbb/0x4c50 [ 2046.016601][T31829] tomoyo_realpath_from_path+0xc2/0x620 [ 2046.016648][T31829] ? tomoyo_profile+0x42/0x50 [ 2046.016671][T31829] tomoyo_path_number_perm+0x1c2/0x4d0 [ 2046.016684][T31829] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 2046.016702][T31829] ? tomoyo_execute_permission+0x470/0x470 [ 2046.016713][T31829] ? __bfs+0x520/0x520 [ 2046.016724][T31829] ? __bfs+0x520/0x520 [ 2046.016749][T31829] ? __fget_files+0x30d/0x500 [ 2046.016786][T31829] ? __fget_files+0x32f/0x500 [ 2046.016808][T31829] ? ksys_dup3+0x3c0/0x3c0 [ 2046.016824][T31829] ? __sb_end_write+0x101/0x1d0 [ 2046.016840][T31829] ? vfs_write+0x161/0x5d0 [ 2046.016865][T31829] security_file_ioctl+0x6c/0xb0 [ 2046.016884][T31829] ksys_ioctl+0x50/0x180 [ 2046.016903][T31829] __x64_sys_ioctl+0x6f/0xb0 [ 2046.016918][T31829] ? lockdep_hardirqs_on+0x463/0x620 [ 2046.016937][T31829] do_syscall_64+0xf6/0x7d0 [ 2046.016959][T31829] entry_SYSCALL_64_after_hwframe+0x49/0xb3 11:02:29 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x7ffff000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:29 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x4000000) 11:02:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(0x0, &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) [ 2046.016972][T31829] RIP: 0033:0x45ca29 [ 2046.016989][T31829] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2046.016998][T31829] RSP: 002b:00007f422b8adc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2046.017014][T31829] RAX: ffffffffffffffda RBX: 00000000004f0880 RCX: 000000000045ca29 [ 2046.017024][T31829] RDX: 0000000020000000 RSI: 0000000080045503 RDI: 0000000000000003 [ 2046.017034][T31829] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2046.017044][T31829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2046.017054][T31829] R13: 00000000000005e9 R14: 00000000004c8b40 R15: 00007f422b8ae6d4 [ 2046.022449][T31829] ERROR: Out of memory at tomoyo_realpath_from_path. 11:02:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)) 11:02:29 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) 11:02:29 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x8dffffff, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:29 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x5000000) 11:02:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0), &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) 11:02:29 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x8dffffff}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) [ 2046.022705][T31829] usb usb9: usbfs: process 31829 (syz-executor.2) did not claim interface 0 before use [ 2046.635755][T31849] FAULT_INJECTION: forcing a failure. [ 2046.635755][T31849] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2046.649321][T31849] CPU: 1 PID: 31849 Comm: syz-executor.2 Not tainted 5.7.0-rc6-syzkaller #0 [ 2046.658010][T31849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2046.668078][T31849] Call Trace: [ 2046.671393][T31849] dump_stack+0x188/0x20d [ 2046.675750][T31849] should_fail.cold+0x5/0xa [ 2046.680299][T31849] ? fault_create_debugfs_attr+0x140/0x140 11:02:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0), &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) [ 2046.686998][T31849] ? print_usage_bug+0x240/0x240 11:02:30 executing program 2 (fault-call:1 fault-nth:2): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) [ 2046.687030][T31849] __alloc_pages_nodemask+0x17a/0x810 [ 2046.687055][T31849] ? __alloc_pages_slowpath.constprop.0+0x2660/0x2660 11:02:30 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x6000000) [ 2046.687080][T31849] ? mark_held_locks+0xe0/0xe0 [ 2046.687096][T31849] ? print_usage_bug+0x240/0x240 [ 2046.687121][T31849] cache_grow_begin+0x8c/0xc10 11:02:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0), &(0x7f0000000240)={0x7ff, 0x7ff, 0x3, 0x8080, 0x5, 0x5c25}) [ 2046.687141][T31849] ? cache_alloc_pfmemalloc+0x1e/0x140 11:02:30 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x7000000) [ 2046.687162][T31849] __kmalloc+0x6dc/0x7a0 11:02:30 executing program 2 (fault-call:1 fault-nth:3): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) [ 2046.687180][T31849] ? tomoyo_realpath_from_path+0xc2/0x620 [ 2046.687195][T31849] ? lock_release+0x800/0x800 [ 2046.687205][T31849] ? __lock_acquire+0xcbb/0x4c50 [ 2046.687222][T31849] tomoyo_realpath_from_path+0xc2/0x620 [ 2046.687237][T31849] ? tomoyo_profile+0x42/0x50 [ 2046.687258][T31849] tomoyo_path_number_perm+0x1c2/0x4d0 [ 2046.687271][T31849] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 2046.687287][T31849] ? tomoyo_execute_permission+0x470/0x470 [ 2046.687299][T31849] ? __bfs+0x520/0x520 [ 2046.687311][T31849] ? __bfs+0x520/0x520 [ 2046.687338][T31849] ? __fget_files+0x30d/0x500 [ 2046.687375][T31849] ? __fget_files+0x32f/0x500 [ 2046.687418][T31849] ? ksys_dup3+0x3c0/0x3c0 [ 2046.687434][T31849] ? __sb_end_write+0x101/0x1d0 [ 2046.687449][T31849] ? vfs_write+0x161/0x5d0 [ 2046.687479][T31849] security_file_ioctl+0x6c/0xb0 [ 2046.687497][T31849] ksys_ioctl+0x50/0x180 [ 2046.687516][T31849] __x64_sys_ioctl+0x6f/0xb0 [ 2046.687530][T31849] ? lockdep_hardirqs_on+0x463/0x620 [ 2046.687548][T31849] do_syscall_64+0xf6/0x7d0 [ 2046.687570][T31849] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2046.687583][T31849] RIP: 0033:0x45ca29 [ 2046.687599][T31849] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2046.687607][T31849] RSP: 002b:00007f422b8adc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2046.687621][T31849] RAX: ffffffffffffffda RBX: 00000000004f0880 RCX: 000000000045ca29 [ 2046.687630][T31849] RDX: 0000000020000000 RSI: 0000000080045503 RDI: 0000000000000003 [ 2046.687640][T31849] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2046.687649][T31849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2046.687659][T31849] R13: 00000000000005e9 R14: 00000000004c8b40 R15: 00007f422b8ae6d4 [ 2046.736923][T31849] usb usb9: usbfs: process 31849 (syz-executor.2) did not claim interface 0 before use [ 2046.901693][T31863] usb usb9: usbfs: process 31863 (syz-executor.2) did not claim interface 0 before use [ 2046.901726][T31863] FAULT_INJECTION: forcing a failure. [ 2046.901726][T31863] name failslab, interval 1, probability 0, space 0, times 0 [ 2046.901743][T31863] CPU: 0 PID: 31863 Comm: syz-executor.2 Not tainted 5.7.0-rc6-syzkaller #0 [ 2046.901753][T31863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2046.901758][T31863] Call Trace: [ 2046.901780][T31863] dump_stack+0x188/0x20d [ 2046.901804][T31863] should_fail.cold+0x5/0xa [ 2046.901827][T31863] ? fault_create_debugfs_attr+0x140/0x140 [ 2046.901857][T31863] should_failslab+0x5/0xf [ 2046.901875][T31863] __kmalloc_track_caller+0x2d1/0x7a0 [ 2046.901891][T31863] ? kstrdup_const+0x53/0x80 [ 2046.901918][T31863] kstrdup+0x36/0x70 [ 2046.901935][T31863] kstrdup_const+0x53/0x80 [ 2046.902026][T31863] __kernfs_new_node+0x9d/0x690 [ 2046.902049][T31863] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 2046.902075][T31863] ? find_held_lock+0x2d/0x110 [ 2046.902094][T31863] ? sysfs_do_create_link_sd.isra.0+0x7d/0x130 [ 2046.902118][T31863] kernfs_new_node+0x93/0x120 [ 2046.902138][T31863] kernfs_create_link+0xcb/0x230 [ 2046.902159][T31863] sysfs_do_create_link_sd.isra.0+0x8b/0x130 [ 2046.902178][T31863] sysfs_create_link+0x61/0xc0 [ 2046.902287][T31863] driver_sysfs_add+0xf5/0x290 [ 2046.902305][T31863] device_bind_driver+0x15/0xd0 [ 2046.902413][T31863] usb_driver_claim_interface+0x240/0x420 [ 2046.902445][T31863] claimintf+0x153/0x270 [ 2046.902469][T31863] checkintf.cold+0x88/0x97 [ 2046.902490][T31863] usbdev_ioctl+0x1908/0x31e0 [ 2046.902514][T31863] ? proc_do_submiturb+0x3530/0x3530 [ 2046.902532][T31863] ? __fget_files+0x30d/0x500 [ 2046.902559][T31863] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 2046.902577][T31863] ? do_vfs_ioctl+0x50c/0x1360 [ 2046.902597][T31863] ? ioctl_file_clone+0x180/0x180 [ 2046.902617][T31863] ? __fget_files+0x32f/0x500 [ 2046.902639][T31863] ? ksys_dup3+0x3c0/0x3c0 [ 2046.902655][T31863] ? __sb_end_write+0x101/0x1d0 [ 2046.902671][T31863] ? vfs_write+0x161/0x5d0 [ 2046.902696][T31863] ? proc_do_submiturb+0x3530/0x3530 [ 2046.902713][T31863] ksys_ioctl+0x11a/0x180 [ 2046.902732][T31863] __x64_sys_ioctl+0x6f/0xb0 [ 2046.902748][T31863] ? lockdep_hardirqs_on+0x463/0x620 [ 2046.902766][T31863] do_syscall_64+0xf6/0x7d0 [ 2046.902788][T31863] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2046.902801][T31863] RIP: 0033:0x45ca29 [ 2046.902819][T31863] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2046.902828][T31863] RSP: 002b:00007f422b8adc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2046.902844][T31863] RAX: ffffffffffffffda RBX: 00000000004f0880 RCX: 000000000045ca29 [ 2046.902854][T31863] RDX: 0000000020000000 RSI: 0000000080045503 RDI: 0000000000000003 [ 2046.902864][T31863] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2046.902874][T31863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2046.902883][T31863] R13: 00000000000005e9 R14: 00000000004c8b40 R15: 00007f422b8ae6d4 [ 2047.096336][T31872] usb usb9: usbfs: process 31872 (syz-executor.2) did not claim interface 0 before use [ 2047.096371][T31872] FAULT_INJECTION: forcing a failure. [ 2047.096371][T31872] name failslab, interval 1, probability 0, space 0, times 0 [ 2047.096389][T31872] CPU: 0 PID: 31872 Comm: syz-executor.2 Not tainted 5.7.0-rc6-syzkaller #0 [ 2047.096400][T31872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2047.096405][T31872] Call Trace: [ 2047.096428][T31872] dump_stack+0x188/0x20d [ 2047.096458][T31872] should_fail.cold+0x5/0xa [ 2047.096477][T31872] ? fault_create_debugfs_attr+0x140/0x140 [ 2047.096505][T31872] should_failslab+0x5/0xf [ 2047.096522][T31872] __kmalloc_track_caller+0x2d1/0x7a0 [ 2047.096538][T31872] ? kstrdup_const+0x53/0x80 [ 2047.096561][T31872] kstrdup+0x36/0x70 [ 2047.096575][T31872] kstrdup_const+0x53/0x80 [ 2047.096593][T31872] __kernfs_new_node+0x9d/0x690 [ 2047.096616][T31872] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 2047.096639][T31872] ? find_held_lock+0x2d/0x110 [ 2047.096657][T31872] ? sysfs_do_create_link_sd.isra.0+0x7d/0x130 [ 2047.096683][T31872] kernfs_new_node+0x93/0x120 [ 2047.096704][T31872] kernfs_create_link+0xcb/0x230 [ 2047.096725][T31872] sysfs_do_create_link_sd.isra.0+0x8b/0x130 [ 2047.096744][T31872] sysfs_create_link+0x61/0xc0 [ 2047.096764][T31872] driver_sysfs_add+0xf5/0x290 [ 2047.096780][T31872] device_bind_driver+0x15/0xd0 [ 2047.096801][T31872] usb_driver_claim_interface+0x240/0x420 [ 2047.096825][T31872] claimintf+0x153/0x270 [ 2047.096845][T31872] checkintf.cold+0x88/0x97 [ 2047.096865][T31872] usbdev_ioctl+0x1908/0x31e0 [ 2047.096889][T31872] ? proc_do_submiturb+0x3530/0x3530 [ 2047.096905][T31872] ? __fget_files+0x30d/0x500 [ 2047.096930][T31872] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 2047.096946][T31872] ? do_vfs_ioctl+0x50c/0x1360 [ 2047.096975][T31872] ? ioctl_file_clone+0x180/0x180 [ 2047.096996][T31872] ? __fget_files+0x32f/0x500 [ 2047.097017][T31872] ? ksys_dup3+0x3c0/0x3c0 [ 2047.097032][T31872] ? __sb_end_write+0x101/0x1d0 [ 2047.097047][T31872] ? vfs_write+0x161/0x5d0 [ 2047.097072][T31872] ? proc_do_submiturb+0x3530/0x3530 [ 2047.097089][T31872] ksys_ioctl+0x11a/0x180 [ 2047.097108][T31872] __x64_sys_ioctl+0x6f/0xb0 [ 2047.097123][T31872] ? lockdep_hardirqs_on+0x463/0x620 [ 2047.097140][T31872] do_syscall_64+0xf6/0x7d0 [ 2047.097163][T31872] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2047.097177][T31872] RIP: 0033:0x45ca29 [ 2047.097196][T31872] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2047.097206][T31872] RSP: 002b:00007f422b8adc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 11:02:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) modify_ldt$read_default(0x2, &(0x7f0000000740)=""/248, 0xf8) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getsockopt$sock_buf(r1, 0x1, 0x1f, &(0x7f0000000600)=""/233, &(0x7f0000000700)=0xe9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioperm(0x2, 0x3f, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f00000000c0)={{0x3, 0x0, 0x59d, 0x6, '\x00', 0x3}, 0x1, [0xff, 0x1, 0x401, 0x6, 0x2, 0x8ccc, 0x3, 0x2, 0x3, 0x3, 0x28, 0x0, 0x2, 0x3, 0x2, 0x0, 0xffffffff80000000, 0x4, 0x4, 0x1, 0x8, 0x2eaf, 0x0, 0x0, 0x3f, 0xffffffff, 0xe, 0x7, 0x2, 0x7fffffff, 0x100, 0x1, 0x4, 0x3f, 0x407, 0x4, 0x5316, 0x8, 0x8, 0xc33, 0x63, 0x9, 0x3, 0x8, 0x20, 0x9, 0xfffffffffffffffb, 0x80000000, 0x1800000, 0x3, 0x0, 0x2, 0xc3e, 0x2, 0x100000001, 0x20000000000, 0xfffffffffffffffa, 0x0, 0x9, 0x3, 0x200, 0x0, 0x7, 0x100000001, 0x100000001, 0x1000, 0x6, 0x5, 0x8, 0x1, 0x2, 0xfffffffffffffff7, 0xc006, 0xfffffffffffffffc, 0x5, 0x0, 0xffff, 0x6000000000, 0x5, 0x3a, 0x9, 0x3, 0x100000001, 0x3f, 0x400, 0x7, 0x0, 0xe577, 0x2, 0x3, 0xffffffff, 0x4, 0x9, 0x8, 0x8, 0xfffffffffffffe01, 0x6, 0x1, 0x100000000, 0xcb45, 0x6, 0x2, 0xbad5, 0x2, 0x7fffffff, 0x3, 0x0, 0x9f06, 0x3f, 0x3, 0x1f, 0x1000, 0x1, 0x800, 0xfffffffffffffffc, 0x8000, 0x80000001, 0x20, 0x3ff, 0x200, 0xfffffffffffffffe, 0x0, 0x40, 0x2, 0x7fffffff, 0x7, 0x7d]}) 11:02:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:31 executing program 2 (fault-call:1 fault-nth:4): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) 11:02:31 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0xf5ffffff) 11:02:31 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0xf0ffffff, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:31 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0xf0ffffff}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) [ 2047.097224][T31872] RAX: ffffffffffffffda RBX: 00000000004f0880 RCX: 000000000045ca29 [ 2047.097237][T31872] RDX: 0000000020000000 RSI: 0000000080045503 RDI: 0000000000000003 [ 2047.097247][T31872] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2047.097257][T31872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2047.097266][T31872] R13: 00000000000005e9 R14: 00000000004c8b40 R15: 00007f422b8ae6d4 11:02:31 executing program 5 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) [ 2048.081851][T31884] usb usb9: usbfs: process 31884 (syz-executor.2) did not claim interface 0 before use 11:02:31 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0xffff0000) 11:02:31 executing program 2 (fault-call:1 fault-nth:5): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) 11:02:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) [ 2048.139737][T31884] FAULT_INJECTION: forcing a failure. [ 2048.139737][T31884] name failslab, interval 1, probability 0, space 0, times 0 [ 2048.139759][T31884] CPU: 0 PID: 31884 Comm: syz-executor.2 Not tainted 5.7.0-rc6-syzkaller #0 [ 2048.139773][T31884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 11:02:31 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0xfffffff5) [ 2048.139779][T31884] Call Trace: [ 2048.139810][T31884] dump_stack+0x188/0x20d [ 2048.139839][T31884] should_fail.cold+0x5/0xa 11:02:31 executing program 2 (fault-call:1 fault-nth:6): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) [ 2048.139860][T31884] ? fault_create_debugfs_attr+0x140/0x140 [ 2048.139893][T31884] should_failslab+0x5/0xf [ 2048.139910][T31884] kmem_cache_alloc+0x29b/0x740 [ 2048.139925][T31884] ? memcpy+0x39/0x60 [ 2048.139942][T31884] ? kstrdup+0x56/0x70 [ 2048.139965][T31884] __kernfs_new_node+0xd4/0x690 [ 2048.139987][T31884] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 2048.140012][T31884] ? find_held_lock+0x2d/0x110 [ 2048.140030][T31884] ? sysfs_do_create_link_sd.isra.0+0x7d/0x130 [ 2048.140055][T31884] kernfs_new_node+0x93/0x120 [ 2048.140075][T31884] kernfs_create_link+0xcb/0x230 [ 2048.140096][T31884] sysfs_do_create_link_sd.isra.0+0x8b/0x130 [ 2048.140114][T31884] sysfs_create_link+0x61/0xc0 [ 2048.140133][T31884] driver_sysfs_add+0xf5/0x290 [ 2048.140150][T31884] device_bind_driver+0x15/0xd0 [ 2048.140169][T31884] usb_driver_claim_interface+0x240/0x420 [ 2048.140191][T31884] claimintf+0x153/0x270 [ 2048.140212][T31884] checkintf.cold+0x88/0x97 [ 2048.140239][T31884] usbdev_ioctl+0x1908/0x31e0 [ 2048.140261][T31884] ? proc_do_submiturb+0x3530/0x3530 [ 2048.140278][T31884] ? __fget_files+0x30d/0x500 [ 2048.140303][T31884] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 2048.140318][T31884] ? do_vfs_ioctl+0x50c/0x1360 [ 2048.140337][T31884] ? ioctl_file_clone+0x180/0x180 [ 2048.140356][T31884] ? __fget_files+0x32f/0x500 [ 2048.140377][T31884] ? ksys_dup3+0x3c0/0x3c0 [ 2048.140393][T31884] ? __sb_end_write+0x101/0x1d0 [ 2048.140408][T31884] ? vfs_write+0x161/0x5d0 [ 2048.140432][T31884] ? proc_do_submiturb+0x3530/0x3530 [ 2048.140447][T31884] ksys_ioctl+0x11a/0x180 [ 2048.140465][T31884] __x64_sys_ioctl+0x6f/0xb0 [ 2048.140480][T31884] ? lockdep_hardirqs_on+0x463/0x620 [ 2048.140498][T31884] do_syscall_64+0xf6/0x7d0 [ 2048.140520][T31884] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2048.140534][T31884] RIP: 0033:0x45ca29 [ 2048.140551][T31884] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2048.140560][T31884] RSP: 002b:00007f422b8adc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2048.140575][T31884] RAX: ffffffffffffffda RBX: 00000000004f0880 RCX: 000000000045ca29 [ 2048.140585][T31884] RDX: 0000000020000000 RSI: 0000000080045503 RDI: 0000000000000003 [ 2048.140594][T31884] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2048.140604][T31884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2048.140614][T31884] R13: 00000000000005e9 R14: 00000000004c8b40 R15: 00007f422b8ae6d4 [ 2048.305364][T31895] usb usb9: usbfs: process 31895 (syz-executor.2) did not claim interface 0 before use [ 2048.305549][T31895] FAULT_INJECTION: forcing a failure. [ 2048.305549][T31895] name failslab, interval 1, probability 0, space 0, times 0 [ 2048.305708][T31895] CPU: 0 PID: 31895 Comm: syz-executor.2 Not tainted 5.7.0-rc6-syzkaller #0 [ 2048.305719][T31895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2048.305726][T31895] Call Trace: [ 2048.305750][T31895] dump_stack+0x188/0x20d [ 2048.305781][T31895] should_fail.cold+0x5/0xa [ 2048.305802][T31895] ? fault_create_debugfs_attr+0x140/0x140 [ 2048.305821][T31895] ? mark_lock+0x12b/0xf10 [ 2048.305844][T31895] should_failslab+0x5/0xf [ 2048.305861][T31895] kmem_cache_alloc+0x44/0x740 [ 2048.305877][T31895] ? save_stack+0x32/0x40 [ 2048.305889][T31895] ? save_stack+0x1b/0x40 [ 2048.305911][T31895] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 2048.305935][T31895] radix_tree_node_alloc.constprop.0+0x1e3/0x330 [ 2048.306037][T31895] idr_get_free+0x4a3/0x8e0 [ 2048.306067][T31895] idr_alloc_u32+0x170/0x2d0 [ 2048.306091][T31895] ? __fprop_inc_percpu_max+0x210/0x210 [ 2048.306109][T31895] ? lock_acquire+0x1f2/0x8f0 [ 2048.306127][T31895] ? __kernfs_new_node+0xff/0x690 [ 2048.306149][T31895] ? __kernfs_new_node+0xd4/0x690 [ 2048.306171][T31895] idr_alloc_cyclic+0x102/0x220 [ 2048.306190][T31895] ? idr_alloc+0x130/0x130 [ 2048.306206][T31895] ? rwlock_bug.part.0+0x90/0x90 [ 2048.306221][T31895] ? __radix_tree_preload+0x1fe/0x280 [ 2048.306248][T31895] __kernfs_new_node+0x117/0x690 [ 2048.306271][T31895] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 2048.306296][T31895] ? find_held_lock+0x2d/0x110 [ 2048.306312][T31895] ? sysfs_do_create_link_sd.isra.0+0x7d/0x130 [ 2048.306334][T31895] kernfs_new_node+0x93/0x120 [ 2048.306352][T31895] kernfs_create_link+0xcb/0x230 [ 2048.306370][T31895] sysfs_do_create_link_sd.isra.0+0x8b/0x130 [ 2048.306388][T31895] sysfs_create_link+0x61/0xc0 [ 2048.306407][T31895] driver_sysfs_add+0xf5/0x290 [ 2048.306423][T31895] device_bind_driver+0x15/0xd0 [ 2048.306443][T31895] usb_driver_claim_interface+0x240/0x420 [ 2048.306464][T31895] claimintf+0x153/0x270 [ 2048.306483][T31895] checkintf.cold+0x88/0x97 [ 2048.306502][T31895] usbdev_ioctl+0x1908/0x31e0 [ 2048.306524][T31895] ? proc_do_submiturb+0x3530/0x3530 [ 2048.306539][T31895] ? __fget_files+0x30d/0x500 [ 2048.306562][T31895] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 2048.306576][T31895] ? do_vfs_ioctl+0x50c/0x1360 [ 2048.306594][T31895] ? ioctl_file_clone+0x180/0x180 [ 2048.306611][T31895] ? __fget_files+0x32f/0x500 [ 2048.306631][T31895] ? ksys_dup3+0x3c0/0x3c0 [ 2048.306645][T31895] ? __sb_end_write+0x101/0x1d0 [ 2048.306657][T31895] ? vfs_write+0x161/0x5d0 [ 2048.306677][T31895] ? proc_do_submiturb+0x3530/0x3530 [ 2048.306692][T31895] ksys_ioctl+0x11a/0x180 [ 2048.306707][T31895] __x64_sys_ioctl+0x6f/0xb0 [ 2048.306720][T31895] ? lockdep_hardirqs_on+0x463/0x620 [ 2048.306738][T31895] do_syscall_64+0xf6/0x7d0 [ 2048.306759][T31895] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2048.306772][T31895] RIP: 0033:0x45ca29 [ 2048.306789][T31895] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2048.306799][T31895] RSP: 002b:00007f422b8adc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2048.306815][T31895] RAX: ffffffffffffffda RBX: 00000000004f0880 RCX: 000000000045ca29 [ 2048.306824][T31895] RDX: 0000000020000000 RSI: 0000000080045503 RDI: 0000000000000003 [ 2048.306832][T31895] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2048.306840][T31895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2048.306849][T31895] R13: 00000000000005e9 R14: 00000000004c8b40 R15: 00007f422b8ae6d4 [ 2048.489699][T31902] usb usb9: usbfs: process 31902 (syz-executor.2) did not claim interface 0 before use [ 2048.490112][T31902] FAULT_INJECTION: forcing a failure. [ 2048.490112][T31902] name failslab, interval 1, probability 0, space 0, times 0 [ 2048.490132][T31902] CPU: 0 PID: 31902 Comm: syz-executor.2 Not tainted 5.7.0-rc6-syzkaller #0 [ 2048.490143][T31902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2048.490149][T31902] Call Trace: [ 2048.490173][T31902] dump_stack+0x188/0x20d [ 2048.490197][T31902] should_fail.cold+0x5/0xa [ 2048.490216][T31902] ? fault_create_debugfs_attr+0x140/0x140 [ 2048.490256][T31902] should_failslab+0x5/0xf [ 2048.490274][T31902] kmem_cache_alloc+0x29b/0x740 [ 2048.490304][T31902] __kernfs_new_node+0xd4/0x690 [ 2048.490330][T31902] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 2048.490353][T31902] ? find_held_lock+0x2d/0x110 [ 2048.490371][T31902] ? sysfs_do_create_link_sd.isra.0+0x7d/0x130 [ 2048.490396][T31902] kernfs_new_node+0x93/0x120 [ 2048.490418][T31902] kernfs_create_link+0xcb/0x230 [ 2048.490437][T31902] sysfs_do_create_link_sd.isra.0+0x8b/0x130 [ 2048.490455][T31902] sysfs_create_link+0x61/0xc0 [ 2048.490475][T31902] driver_sysfs_add+0x175/0x290 [ 2048.490491][T31902] device_bind_driver+0x15/0xd0 [ 2048.490511][T31902] usb_driver_claim_interface+0x240/0x420 [ 2048.490533][T31902] claimintf+0x153/0x270 [ 2048.490554][T31902] checkintf.cold+0x88/0x97 [ 2048.490574][T31902] usbdev_ioctl+0x1908/0x31e0 [ 2048.490597][T31902] ? proc_do_submiturb+0x3530/0x3530 [ 2048.490618][T31902] ? __fget_files+0x30d/0x500 [ 2048.490642][T31902] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 2048.490660][T31902] ? do_vfs_ioctl+0x50c/0x1360 [ 2048.490680][T31902] ? ioctl_file_clone+0x180/0x180 [ 2048.490700][T31902] ? __fget_files+0x32f/0x500 [ 2048.490720][T31902] ? ksys_dup3+0x3c0/0x3c0 [ 2048.490735][T31902] ? __sb_end_write+0x101/0x1d0 [ 2048.490750][T31902] ? vfs_write+0x161/0x5d0 [ 2048.490775][T31902] ? proc_do_submiturb+0x3530/0x3530 [ 2048.490790][T31902] ksys_ioctl+0x11a/0x180 [ 2048.490809][T31902] __x64_sys_ioctl+0x6f/0xb0 [ 2048.490824][T31902] ? lockdep_hardirqs_on+0x463/0x620 [ 2048.490842][T31902] do_syscall_64+0xf6/0x7d0 [ 2048.490864][T31902] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2048.490876][T31902] RIP: 0033:0x45ca29 [ 2048.490894][T31902] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2048.490903][T31902] RSP: 002b:00007f422b8adc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2048.490919][T31902] RAX: ffffffffffffffda RBX: 00000000004f0880 RCX: 000000000045ca29 [ 2048.490928][T31902] RDX: 0000000020000000 RSI: 0000000080045503 RDI: 0000000000000003 [ 2048.490937][T31902] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2048.490948][T31902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 11:02:33 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x10000000000000) 11:02:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x19980330}, 0x0) 11:02:33 executing program 2 (fault-call:1 fault-nth:7): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) 11:02:33 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0xffffff7f, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:33 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0xffffff7f}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) [ 2048.490959][T31902] R13: 00000000000005e9 R14: 00000000004c8b40 R15: 00007f422b8ae6d4 11:02:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r6, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev}]}, 0x3c}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r6, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1={0xfc, 0x1, [], 0x1}}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3635}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000600)={&(0x7f0000000400)="a26267992aef1966e7abde13c4435188b644c3f46b58c03d2598e95b1b814c3bd8b5fc32d93bbd876b3ec6bc629ed2d62af94f09e94f2f9c1e4cf35aac940c7c83f2e6f333185ae36366f20d76d192765d49a7d42ac68bf2f0344c636841488c963151bd21e85943a42d6d19cf1bdc7e149e40cebe33371042965dcdc5366766a6497a1ca65f5ae88d88b191", &(0x7f00000004c0)=""/44, &(0x7f0000000500)="fea9aa5873810d0c9a2cdaf398fa3deb64d8fdc892412e1aa84d9aa457d95156e72c848a3fa251502aa8148d2eb38afffbe0e69040ae6aac927012b06bf60714ac3fdeecfa515e07670c5b854d6299602213e3e3131f5bda0894d9ceac75c8bc5b9367f6e3babb6996c6f68f70b6199822b52e7cfda039c0971b33cfe429c7c4ea1ec81ea86be6266d3af7cd40139cac82ff54f3814b47dadddd624b15f3ad4fcfc6095ad184ef04960b", &(0x7f00000005c0)="0d7a14d4c3219cd52a72a3ed378be4ab615c22f57235182eab8cb27508086208142cb4d1e6c436bf465d73572446b00e2d63b3", 0x0, r8}, 0x38) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000040)={0x1c, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="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", 0x164}], 0x1) [ 2049.645074][T31916] usb usb9: usbfs: process 31916 (syz-executor.2) did not claim interface 0 before use 11:02:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20080522}, 0x0) 11:02:33 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x100000000000000) 11:02:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) 11:02:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x6) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000100)={0x6, 0x0, 0x4, 0x2000, 0x2, {}, {0x2, 0xc, 0x6, 0x3f, 0x19, 0xb6, "84cc5f94"}, 0x0, 0x4, @fd=r1, 0x1ff, 0x0, r2}) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000040)="019adebd160cd579eec51d1180003ba774faa9005b877a4e21", 0x9, r3) keyctl$KEYCTL_PKEY_QUERY(0x18, r3, 0x0, &(0x7f0000000080)='wlan1proc\x00', &(0x7f00000000c0)) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f00000002c0)) capget(&(0x7f0000000040)={0x19980330, r4}, 0x0) 11:02:33 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x200000000000000) 11:02:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x2, &(0x7f0000000000)={0x1, 0x1}) [ 2049.862211][T31927] usb usb9: usbfs: process 31927 (syz-executor.2) did not claim interface 0 before use 11:02:33 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x300000000000000) 11:02:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000000)=0x6) 11:02:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x10, &(0x7f0000000000)={0x1, 0x1}) 11:02:33 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0xffffff8d, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:34 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0xffffff8d}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:34 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x400000000000000) 11:02:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x1267, &(0x7f0000000000)={0x1, 0x1}) 11:02:34 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000002080)='/dev/zero\x00', 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x800, 0x0) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) writev(r0, &(0x7f0000002140)=[{&(0x7f0000000080)="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"}, {&(0x7f0000001080)="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"}, {&(0x7f00000020c0)="c69ec06de72fd681ffd5f737562520830773ed5d8c987624d327460829b71463ecc6c854adb32104d1c8507b2fc08252c83442e9ce15888674b673fc4bbb9a66dbd7"}], 0xffffffffffffee8) 11:02:34 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0xfffffff0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000000)) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:34 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x500000000000000) 11:02:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x1277, &(0x7f0000000000)={0x1, 0x1}) 11:02:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000000)={r0}) r4 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r4, 0xc010640c, &(0x7f0000000000)={0x4}) r5 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r5, 0xc010640c, &(0x7f0000000000)={0x4}) r6 = dup(r5) r7 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r7, 0xc010640c, &(0x7f0000000000)={0x4}) r8 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r8, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$FS_IOC_GETFSLABEL(r8, 0x81009431, &(0x7f0000000200)) fsetxattr$security_evm(r7, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140)=@v2={0x5, 0x0, 0x12, 0x3, 0x72, "927d088beae7e7988c29c570f433c8d6c28cf2dbb083e8a82e6c572c0479b477806d27ba729d6712183f5e1884e1c50c526a13d8e3322844c4b2d58fc841837b96f878398af9a346129351bda625348fe69ccb81bc12a3c01f4d030f4aa4c1baff7cbbbeb40878b26ddc071e8a886ffc47df"}, 0x7b, 0x1) readahead(r1, 0xb, 0xd90) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r3, 0xc1205531, &(0x7f0000000300)={0xf5, 0x7, 0x1ff, 0x1, [], [], [], 0x101, 0x43c00000, 0xfff, 0x4, "0784a47ee12d97ebb1b20960f1820ed0"}) 11:02:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x7, 0x5a, 0x2}) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3758", 0xff7c}], 0x1) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x2201, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000100)={0x101, 0x7}) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 11:02:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4c01, &(0x7f0000000000)={0x1, 0x1}) 11:02:34 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x600000000000000) 11:02:34 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0xfffffff0}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x200400200) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x20402, 0x0) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x5001, &(0x7f0000000000)={0x1, 0x1}) 11:02:34 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x700000000000000) 11:02:34 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="028ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:34 executing program 3 (fault-call:9 fault-nth:0): pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:34 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0xf5ffffffffffffff) [ 2051.382886][T31994] FAULT_INJECTION: forcing a failure. [ 2051.382886][T31994] name failslab, interval 1, probability 0, space 0, times 0 [ 2051.382906][T31994] CPU: 0 PID: 31994 Comm: syz-executor.3 Not tainted 5.7.0-rc6-syzkaller #0 [ 2051.382916][T31994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2051.382923][T31994] Call Trace: [ 2051.382945][T31994] dump_stack+0x188/0x20d [ 2051.382969][T31994] should_fail.cold+0x5/0xa [ 2051.382991][T31994] ? fault_create_debugfs_attr+0x140/0x140 [ 2051.383021][T31994] should_failslab+0x5/0xf [ 2051.383038][T31994] __kmalloc+0x2d9/0x7a0 [ 2051.383057][T31994] ? sock_kmalloc+0xb5/0x100 [ 2051.383073][T31994] ? shash_ahash_update+0xc3/0x110 [ 2051.383091][T31994] ? shash_async_final+0x40/0x40 [ 2051.383110][T31994] sock_kmalloc+0xb5/0x100 [ 2051.383129][T31994] hash_alloc_result.part.0+0x94/0x110 [ 2051.383144][T31994] hash_sendmsg+0x8f1/0xad0 [ 2051.383163][T31994] ? security_socket_sendmsg+0x82/0xb0 [ 2051.383177][T31994] ? hash_recvmsg+0xa80/0xa80 [ 2051.383194][T31994] sock_sendmsg+0xcf/0x120 [ 2051.383212][T31994] ____sys_sendmsg+0x308/0x7e0 [ 2051.383231][T31994] ? kernel_sendmsg+0x50/0x50 [ 2051.383246][T31994] ? __bfs+0x520/0x520 [ 2051.383278][T31994] ___sys_sendmsg+0x100/0x170 [ 2051.383296][T31994] ? sendmsg_copy_msghdr+0x70/0x70 [ 2051.383325][T31994] ? __fget_files+0x32f/0x500 [ 2051.383346][T31994] ? ksys_dup3+0x3c0/0x3c0 [ 2051.383363][T31994] ? perf_trace_lock+0xeb/0x4c0 [ 2051.383385][T31994] ? __fget_light+0x20e/0x270 [ 2051.383407][T31994] __sys_sendmmsg+0x195/0x480 11:02:34 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0xffff000000000000) [ 2051.383427][T31994] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2051.383443][T31994] ? lock_downgrade+0x840/0x840 [ 2051.383475][T31994] ? __mutex_unlock_slowpath+0xe2/0x660 [ 2051.383500][T31994] ? wait_for_completion+0x270/0x270 [ 2051.383514][T31994] ? __this_cpu_preempt_check+0x28/0x190 [ 2051.383530][T31994] ? __sb_end_write+0x101/0x1d0 [ 2051.383548][T31994] ? vfs_write+0x161/0x5d0 [ 2051.567548][T31994] ? fput_many+0x2f/0x1a0 [ 2051.571886][T31994] ? ksys_write+0x1a5/0x250 [ 2051.576420][T31994] ? __ia32_sys_read+0xb0/0xb0 [ 2051.581193][T31994] ? __ia32_sys_clock_settime+0x260/0x260 [ 2051.586927][T31994] __x64_sys_sendmmsg+0x99/0x100 [ 2051.591900][T31994] ? lockdep_hardirqs_on+0x463/0x620 [ 2051.597204][T31994] do_syscall_64+0xf6/0x7d0 [ 2051.601725][T31994] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2051.607625][T31994] RIP: 0033:0x45ca29 [ 2051.611543][T31994] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:02:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x5411, &(0x7f0000000000)={0x1, 0x1}) [ 2051.631243][T31994] RSP: 002b:00007f81b89e9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2051.639668][T31994] RAX: ffffffffffffffda RBX: 00000000004fc700 RCX: 000000000045ca29 [ 2051.647683][T31994] RDX: 0000000000000002 RSI: 0000000020000f80 RDI: 0000000000000009 [ 2051.655665][T31994] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2051.663649][T31994] R10: 0000000024004880 R11: 0000000000000246 R12: 000000000000000a [ 2051.671633][T31994] R13: 00000000000008e3 R14: 00000000004cba77 R15: 00007f81b89ea6d4 11:02:35 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0xfffffffffffffff5) 11:02:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x5416, &(0x7f0000000000)={0x1, 0x1}) 11:02:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:35 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x7ffffffff000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:35 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="038ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:35 executing program 3 (fault-call:9 fault-nth:1): pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:35 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r3, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @private2={0xfc, 0x2, [], 0x1}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x8090) lseek(r0, 0x3ffffffffd, 0x4) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000040)={0x0, 0x56, "85cce69ac3304e3f68de8947278cd151b46a90f32799ce55f4aafbcbf21b820e0849b75dbe152200ad804d6abe14d4c98a948a3917e2fac0e2edb3cf9420f60edfb1a7d201fab7d6b2a3239c44c42bed84ff1d2d9bee"}) 11:02:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x541b, &(0x7f0000000000)={0x1, 0x1}) 11:02:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SOUND_MIXER_INFO(r1, 0x805c4d65, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x5421, &(0x7f0000000000)={0x1, 0x1}) [ 2052.111488][T32025] FAULT_INJECTION: forcing a failure. [ 2052.111488][T32025] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2052.164449][T32025] CPU: 1 PID: 32025 Comm: syz-executor.3 Not tainted 5.7.0-rc6-syzkaller #0 [ 2052.173158][T32025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2052.183308][T32025] Call Trace: [ 2052.186614][T32025] dump_stack+0x188/0x20d [ 2052.190961][T32025] should_fail.cold+0x5/0xa [ 2052.195478][T32025] ? fault_create_debugfs_attr+0x140/0x140 [ 2052.201306][T32025] __alloc_pages_nodemask+0x17a/0x810 [ 2052.206694][T32025] ? perf_trace_lock+0xeb/0x4c0 [ 2052.211563][T32025] ? mark_held_locks+0xe0/0xe0 [ 2052.216346][T32025] ? __alloc_pages_slowpath.constprop.0+0x2660/0x2660 [ 2052.223131][T32025] ? print_usage_bug+0x240/0x240 [ 2052.228087][T32025] ? mark_lock+0x12b/0xf10 [ 2052.232570][T32025] alloc_pages_current+0xff/0x200 [ 2052.237613][T32025] pte_alloc_one+0x16/0x190 [ 2052.242483][T32025] do_huge_pmd_anonymous_page+0xda7/0x1990 [ 2052.248315][T32025] ? prep_transhuge_page+0xa0/0xa0 [ 2052.253430][T32025] ? pud_val+0x7c/0xf0 [ 2052.257595][T32025] ? pmd_val+0xf0/0xf0 [ 2052.261688][T32025] __handle_mm_fault+0x2cd6/0x3c90 [ 2052.266814][T32025] ? vm_insert_pages+0x6a0/0x6a0 [ 2052.271763][T32025] ? count_memcg_event_mm+0x1e2/0x3d0 [ 2052.277158][T32025] ? mark_held_locks+0x9f/0xe0 [ 2052.281942][T32025] handle_mm_fault+0x1a5/0x660 [ 2052.286726][T32025] __get_user_pages+0x7ab/0x1870 [ 2052.291686][T32025] ? follow_page_mask+0x1e30/0x1e30 [ 2052.296912][T32025] ? pmd_huge+0x150/0x150 [ 2052.301278][T32025] get_user_pages_unlocked+0x198/0x650 [ 2052.306788][T32025] ? get_user_pages_locked+0x720/0x720 [ 2052.312269][T32025] ? mark_held_locks+0x9f/0xe0 [ 2052.317054][T32025] internal_get_user_pages_fast+0x44a/0x4e0 [ 2052.322965][T32025] ? __get_user_pages_fast+0x3d0/0x3d0 [ 2052.328448][T32025] get_user_pages_fast+0x49/0x70 [ 2052.333409][T32025] iov_iter_get_pages+0x29f/0x10c0 [ 2052.338724][T32025] ? csum_and_copy_to_iter+0x13d0/0x13d0 [ 2052.344481][T32025] ? crypto_hash_walk_done+0x4dd/0x540 [ 2052.349967][T32025] af_alg_make_sg+0x98/0x400 [ 2052.354575][T32025] ? shash_ahash_update+0xc3/0x110 [ 2052.359703][T32025] ? af_alg_release+0x110/0x110 [ 2052.364575][T32025] ? af_alg_free_sg+0xa8/0x2f0 [ 2052.369366][T32025] hash_sendmsg+0x45c/0xad0 [ 2052.373889][T32025] ? security_socket_sendmsg+0x82/0xb0 [ 2052.379393][T32025] ? hash_recvmsg+0xa80/0xa80 [ 2052.384083][T32025] sock_sendmsg+0xcf/0x120 [ 2052.388521][T32025] ____sys_sendmsg+0x308/0x7e0 [ 2052.393307][T32025] ? kernel_sendmsg+0x50/0x50 [ 2052.398008][T32025] ? __lock_acquire+0x2184/0x4c50 [ 2052.403059][T32025] ___sys_sendmsg+0x100/0x170 [ 2052.407743][T32025] ? debug_smp_processor_id+0x2f/0x185 [ 2052.413220][T32025] ? sendmsg_copy_msghdr+0x70/0x70 [ 2052.418361][T32025] ? find_held_lock+0x2d/0x110 [ 2052.423135][T32025] ? __might_fault+0x11f/0x1d0 [ 2052.427912][T32025] ? ksys_dup3+0x3c0/0x3c0 [ 2052.432345][T32025] ? lock_downgrade+0x840/0x840 [ 2052.437205][T32025] ? perf_trace_lock+0xeb/0x4c0 [ 2052.442281][T32025] __sys_sendmmsg+0x195/0x480 [ 2052.446979][T32025] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2052.452017][T32025] ? lock_downgrade+0x840/0x840 [ 2052.456924][T32025] ? __mutex_unlock_slowpath+0xe2/0x660 [ 2052.462569][T32025] ? wait_for_completion+0x270/0x270 [ 2052.467856][T32025] ? __this_cpu_preempt_check+0x28/0x190 [ 2052.473507][T32025] ? __sb_end_write+0x101/0x1d0 [ 2052.478375][T32025] ? vfs_write+0x161/0x5d0 [ 2052.482810][T32025] ? fput_many+0x2f/0x1a0 [ 2052.487156][T32025] ? ksys_write+0x1a5/0x250 [ 2052.491676][T32025] ? __ia32_sys_read+0xb0/0xb0 [ 2052.496465][T32025] ? __ia32_sys_clock_settime+0x260/0x260 [ 2052.502210][T32025] __x64_sys_sendmmsg+0x99/0x100 [ 2052.507159][T32025] ? lockdep_hardirqs_on+0x463/0x620 [ 2052.512459][T32025] do_syscall_64+0xf6/0x7d0 [ 2052.516983][T32025] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2052.522885][T32025] RIP: 0033:0x45ca29 [ 2052.526787][T32025] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2052.546484][T32025] RSP: 002b:00007f81b89e9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2052.555346][T32025] RAX: ffffffffffffffda RBX: 00000000004fc700 RCX: 000000000045ca29 11:02:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, r3) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8}]}}]}, 0x38}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r4, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xb5}]}, 0x24}, 0x1, 0x0, 0x0, 0x44000}, 0x40000) r8 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) [ 2052.563420][T32025] RDX: 0000000000000002 RSI: 0000000020000f80 RDI: 0000000000000009 [ 2052.571401][T32025] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2052.579382][T32025] R10: 0000000024004880 R11: 0000000000000246 R12: 000000000000000a [ 2052.587538][T32025] R13: 00000000000008e3 R14: 00000000004cba77 R15: 00007f81b89ea6d4 11:02:36 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/shm\x00', 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x2) lseek(r0, 0x1, 0x0) 11:02:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x5423, &(0x7f0000000000)={0x1, 0x1}) 11:02:36 executing program 3 (fault-call:9 fault-nth:2): pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000200), 0x4) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000240)={0x1d, r3}, 0x18) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xbf6908}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000084}, 0x200400c1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_PIT2(r5, 0x4070aea0, &(0x7f00000002c0)={[{0x8000, 0x7, 0x8, 0xac, 0x1a, 0x3, 0xee, 0x80, 0x0, 0x0, 0x0, 0x1, 0x7fffffff}, {0xfffffffd, 0x1db, 0x0, 0x8, 0xe0, 0xff, 0x9, 0x79, 0x5, 0xfc, 0x0, 0x3, 0x7fffffff}, {0x3, 0x9, 0x6, 0xfd, 0x3f, 0x8, 0x1, 0x9, 0x1, 0x0, 0x7, 0x8, 0x1}], 0x5}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r6 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r6, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) getsockname$unix(r6, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) getpeername$netlink(r1, &(0x7f0000000040), &(0x7f0000000080)=0xc) [ 2052.843124][T32048] FAULT_INJECTION: forcing a failure. [ 2052.843124][T32048] name failslab, interval 1, probability 0, space 0, times 0 [ 2052.888843][T32048] CPU: 1 PID: 32048 Comm: syz-executor.3 Not tainted 5.7.0-rc6-syzkaller #0 [ 2052.897664][T32048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2052.907744][T32048] Call Trace: [ 2052.911049][T32048] dump_stack+0x188/0x20d [ 2052.915398][T32048] should_fail.cold+0x5/0xa [ 2052.919909][T32048] ? fault_create_debugfs_attr+0x140/0x140 [ 2052.926634][T32048] should_failslab+0x5/0xf [ 2052.931193][T32048] kmem_cache_alloc+0x29b/0x740 [ 2052.936060][T32048] ? print_usage_bug+0x240/0x240 [ 2052.941457][T32048] ptlock_alloc+0x1d/0x70 [ 2052.945787][T32048] pte_alloc_one+0x68/0x190 [ 2052.950507][T32048] do_huge_pmd_anonymous_page+0xda7/0x1990 [ 2052.956349][T32048] ? prep_transhuge_page+0xa0/0xa0 [ 2052.961466][T32048] ? pud_val+0x7c/0xf0 [ 2052.965545][T32048] ? pmd_val+0xf0/0xf0 [ 2052.969659][T32048] __handle_mm_fault+0x2cd6/0x3c90 [ 2052.974818][T32048] ? vm_insert_pages+0x6a0/0x6a0 [ 2052.984719][T32048] ? count_memcg_event_mm+0x1e2/0x3d0 [ 2052.990124][T32048] ? mark_held_locks+0x9f/0xe0 [ 2052.994912][T32048] handle_mm_fault+0x1a5/0x660 [ 2052.999718][T32048] __get_user_pages+0x7ab/0x1870 [ 2053.004690][T32048] ? follow_page_mask+0x1e30/0x1e30 [ 2053.009936][T32048] ? pmd_huge+0x150/0x150 [ 2053.014295][T32048] get_user_pages_unlocked+0x198/0x650 [ 2053.019786][T32048] ? get_user_pages_locked+0x720/0x720 [ 2053.025355][T32048] ? mark_held_locks+0x9f/0xe0 [ 2053.030137][T32048] internal_get_user_pages_fast+0x44a/0x4e0 [ 2053.036126][T32048] ? __get_user_pages_fast+0x3d0/0x3d0 [ 2053.041601][T32048] get_user_pages_fast+0x49/0x70 [ 2053.046554][T32048] iov_iter_get_pages+0x29f/0x10c0 [ 2053.051687][T32048] ? csum_and_copy_to_iter+0x13d0/0x13d0 [ 2053.057526][T32048] ? memcpy+0x39/0x60 [ 2053.061551][T32048] ? vmac_update+0x1aa/0x230 [ 2053.066153][T32048] af_alg_make_sg+0x98/0x400 [ 2053.070771][T32048] ? shash_ahash_update+0xc3/0x110 [ 2053.075921][T32048] ? af_alg_release+0x110/0x110 [ 2053.080782][T32048] ? af_alg_free_sg+0xa8/0x2f0 [ 2053.085554][T32048] hash_sendmsg+0x45c/0xad0 [ 2053.090064][T32048] ? security_socket_sendmsg+0x82/0xb0 [ 2053.095661][T32048] ? hash_recvmsg+0xa80/0xa80 [ 2053.100338][T32048] sock_sendmsg+0xcf/0x120 [ 2053.104740][T32048] ____sys_sendmsg+0x308/0x7e0 [ 2053.109902][T32048] ? kernel_sendmsg+0x50/0x50 [ 2053.114566][T32048] ? __lock_acquire+0x2184/0x4c50 [ 2053.119663][T32048] ___sys_sendmsg+0x100/0x170 [ 2053.124328][T32048] ? debug_smp_processor_id+0x2f/0x185 [ 2053.129784][T32048] ? sendmsg_copy_msghdr+0x70/0x70 [ 2053.134900][T32048] ? find_held_lock+0x2d/0x110 [ 2053.139676][T32048] ? __might_fault+0x11f/0x1d0 [ 2053.144519][T32048] ? ksys_dup3+0x3c0/0x3c0 [ 2053.148940][T32048] ? lock_downgrade+0x840/0x840 [ 2053.153771][T32048] ? perf_trace_lock+0xeb/0x4c0 [ 2053.158622][T32048] __sys_sendmmsg+0x195/0x480 [ 2053.163286][T32048] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2053.168285][T32048] ? lock_downgrade+0x840/0x840 [ 2053.173119][T32048] ? __mutex_unlock_slowpath+0xe2/0x660 [ 2053.178663][T32048] ? wait_for_completion+0x270/0x270 [ 2053.183955][T32048] ? __this_cpu_preempt_check+0x28/0x190 [ 2053.189565][T32048] ? __sb_end_write+0x101/0x1d0 [ 2053.194399][T32048] ? vfs_write+0x161/0x5d0 [ 2053.198795][T32048] ? fput_many+0x2f/0x1a0 [ 2053.203110][T32048] ? ksys_write+0x1a5/0x250 [ 2053.207590][T32048] ? __ia32_sys_read+0xb0/0xb0 [ 2053.212341][T32048] ? __ia32_sys_clock_settime+0x260/0x260 [ 2053.218055][T32048] __x64_sys_sendmmsg+0x99/0x100 [ 2053.222986][T32048] ? lockdep_hardirqs_on+0x463/0x620 [ 2053.228461][T32048] do_syscall_64+0xf6/0x7d0 [ 2053.232953][T32048] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2053.239174][T32048] RIP: 0033:0x45ca29 [ 2053.243049][T32048] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2053.264031][T32048] RSP: 002b:00007f81b89e9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2053.272541][T32048] RAX: ffffffffffffffda RBX: 00000000004fc700 RCX: 000000000045ca29 [ 2053.280515][T32048] RDX: 0000000000000002 RSI: 0000000020000f80 RDI: 0000000000000009 11:02:36 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0xf0ff7f00000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:36 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="088ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x5450, &(0x7f0000000000)={0x1, 0x1}) 11:02:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCPNGETOBJECT(r1, 0x89e0, &(0x7f0000000040)=0xf800) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r2, 0x1, 0x0) [ 2053.288468][T32048] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2053.296429][T32048] R10: 0000000024004880 R11: 0000000000000246 R12: 000000000000000a [ 2053.304497][T32048] R13: 00000000000008e3 R14: 00000000004cba77 R15: 00007f81b89ea6d4 11:02:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x5451, &(0x7f0000000000)={0x1, 0x1}) 11:02:36 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) syncfs(r1) 11:02:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x5452, &(0x7f0000000000)={0x1, 0x1}) 11:02:37 executing program 4: lseek(0xffffffffffffffff, 0x9, 0x3) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007280)=[{{&(0x7f0000000040)=@ipx, 0x80, &(0x7f0000000540)=[{&(0x7f00000000c0)=""/152, 0x98}, {&(0x7f0000000180)=""/73, 0x49}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f00000002c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/157, 0x9d}, {&(0x7f0000000440)=""/32, 0x20}, {&(0x7f0000000480)=""/188, 0xbc}], 0x7, &(0x7f00000005c0)=""/240, 0xf0}, 0x800}, {{&(0x7f00000006c0)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000780)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000001780)=@caif=@util, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000001800)=""/148, 0x94}, {&(0x7f00000018c0)=""/186, 0xba}, {&(0x7f0000001980)=""/32, 0x20}, {&(0x7f00000019c0)=""/229, 0xe5}], 0x4, &(0x7f0000001b00)=""/45, 0x2d}, 0xfff}, {{0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000001b40)=""/162, 0xa2}, {&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/73, 0x49}, {&(0x7f0000002c80)=""/24, 0x18}, {&(0x7f0000002cc0)=""/15, 0xf}], 0x5, &(0x7f0000002d80)=""/246, 0xf6}, 0xff}, {{0x0, 0x0, &(0x7f0000003280)=[{&(0x7f0000002e80)=""/142, 0x8e}, {&(0x7f0000002f40)=""/181, 0xb5}, {&(0x7f0000003000)=""/29, 0x1d}, {&(0x7f0000003040)=""/115, 0x73}, {&(0x7f00000030c0)=""/135, 0x87}, {&(0x7f0000003180)=""/235, 0xeb}], 0x6, &(0x7f0000003300)=""/22, 0x16}, 0x222}, {{&(0x7f0000003340)=@tipc=@id, 0x80, &(0x7f0000003440)=[{&(0x7f00000033c0)=""/65, 0x41}], 0x1, &(0x7f0000003480)=""/4096, 0x1000}, 0x774}, {{0x0, 0x0, &(0x7f0000004800)=[{&(0x7f0000004480)=""/160, 0xa0}, {&(0x7f0000004540)=""/252, 0xfc}, {&(0x7f0000004640)=""/147, 0x93}, {&(0x7f0000004700)=""/22, 0x16}, {&(0x7f0000004740)=""/180, 0xb4}], 0x5, &(0x7f0000004880)=""/195, 0xc3}, 0x2}, {{0x0, 0x0, &(0x7f0000006ac0)=[{&(0x7f0000004980)=""/85, 0x55}, {&(0x7f0000004a00)=""/4096, 0x1000}, {&(0x7f0000005a00)=""/108, 0x6c}, {&(0x7f0000005a80)=""/4096, 0x1000}, {&(0x7f0000006a80)=""/39, 0x27}], 0x5}, 0x2d99}, {{&(0x7f0000006b40)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000006d00)=[{&(0x7f0000006bc0)=""/83, 0x53}, {&(0x7f0000006c40)=""/188, 0xbc}], 0x2, &(0x7f0000006d40)=""/213, 0xd5}, 0x6}, {{&(0x7f0000006e40)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000007200)=[{&(0x7f0000006ec0)=""/93, 0x5d}, {&(0x7f0000006f40)=""/153, 0x99}, {&(0x7f0000007000)=""/232, 0xe8}, {&(0x7f0000007100)=""/251, 0xfb}], 0x4, &(0x7f0000007240)=""/61, 0x3d}, 0x10000}], 0xa, 0x101, 0x0) 11:02:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f00000000c0)={0x4}) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4}) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000002c0)) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x84000, 0x0) ioctl$UI_END_FF_ERASE(r4, 0x400c55cb, &(0x7f0000000300)={0x7, 0x1, 0x4}) capget(&(0x7f00000001c0)={0x20080522, r3}, 0x0) dup(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xad, &(0x7f00000004c0)="94a4b04e04000000000000002b615ac5ee9a8f8cbeaf99cfc4dedd20494d4b895b5804ef58d7cee1761cd167fd6e40d0b1eb346f19367f420083cff2dc39f3cc1e564cd165167d6872a0cdd716000000e1d60bef63eaef5d00001c5449c865576d0cfefa36566d4c68b24ec011e163f2975244707780d868116111aeed76c195ae235abe61f83eb11f66b75e0ac88835a0846e7ca26973c47f1a5545c3b153470a3452f072db58a754cb474f2a"}}], 0x1c) wait4(0x0, 0x0, 0x80000002, 0x0) 11:02:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x5460, &(0x7f0000000000)={0x1, 0x1}) 11:02:37 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:37 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2040, 0x0) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000080)=0x3) lseek(r0, 0x1, 0x0) 11:02:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x5501, &(0x7f0000000000)={0x1, 0x1}) 11:02:37 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="108ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x0) 11:02:37 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x4}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x43}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r2, r3, 0x0, 0x8607) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x23, &(0x7f00000002c0)={r5}, 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e22, 0x0, @local}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={r5, 0x80000000, 0x7, 0xfff}, 0x10) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r7 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r7, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r7, 0x660c) lseek(r6, 0x1, 0x0) 11:02:37 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0xf0ffffff7f0000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x550b, &(0x7f0000000000)={0x1, 0x1}) 11:02:37 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000200)={0x3, 0x1, &(0x7f0000000080)=""/26, &(0x7f00000000c0)=""/158, &(0x7f0000000180)=""/110, 0x2}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f0000000040)={'macvlan1\x00', 0x401}) 11:02:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/nf_conntrack\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={&(0x7f0000001500)=ANY=[@ANYBLOB="b8060000", @ANYRES16=r4, @ANYBLOB="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"], 0x6b8}}, 0x0) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000001}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x12ec, r4, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c='\xa0\xcb\x87\x9aG\xf5\xbcdL\x0ei?\xa6\xd01\xc7J\x15S\xb6\xe9\x01\xb9\xff/Q\x8cx\x04/\xb5B'}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b='\xb0\x80s\xe8\xd4N\x91\xe3\xda\x92,\"C\x82D\xbb\x88\\i\xe2i\xc8\xe9\xd85\xb1\x14):M\xdcn'}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x10000}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x4df}, @WGDEVICE_A_PEERS={0x1280, 0x8, 0x0, 0x1, [{0x52c, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x8000}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}, @WGPEER_A_ALLOWEDIPS={0x458, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2d}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}]}, {0x4}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @remote}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x80, 0x9, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24}]}, {0x74, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x3f, @empty, 0xffff}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @private=0xa010100}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @empty}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x7ff, @local, 0x2}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x878, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x2c0, 0x9, 0x0, 0x1, [{0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x14}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2e}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x40}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @rand_addr=0x64010102}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ALLOWEDIPS={0x4ac, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}]}, {0x13c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, [], 0x1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @private=0xa010100}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x20}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2}}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x17}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @multicast2}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x7}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_ALLOWEDIPS={0xb0, 0x9, 0x0, 0x1, [{0xac, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x25}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x41}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}]}]}]}, {0x464, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @private=0xa010101}}, @WGPEER_A_ALLOWEDIPS={0x44c, 0x9, 0x0, 0x1, [{0x94, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x2}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x17}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x4}, {0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5}}]}]}]}]}]}, 0x12ec}}, 0x10) 11:02:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x5514, &(0x7f0000000000)={0x1, 0x1}) 11:02:37 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000040)='\x00', 0x1) [ 2054.415748][T32108] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 11:02:37 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x551f, &(0x7f0000000000)={0x1, 0x1}) 11:02:37 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x10}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:37 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000100)={0x80000001, 0x3, 0x2, 0xcd2, &(0x7f0000000040)=[{}, {}, {}]}) r3 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000000)={0x4}) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000180)) [ 2054.503347][T32116] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 11:02:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000080), &(0x7f00000000c0)=0x4) capget(&(0x7f00000001c0)={0x19980330}, 0x0) 11:02:38 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f0000000040)={0x3, @pix_mp={0x5, 0x2, 0x36314d59, 0x3, 0x8, [{0x4, 0xd0}, {0x9, 0x7}, {0x0, 0x1}, {0x2}, {0x40, 0x1}, {0x0, 0x1f}, {0x9, 0xa50}, {0x4, 0xf7e}], 0x7, 0x81, 0x8, 0x1}}) 11:02:38 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x100000000000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:38 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x5521, &(0x7f0000000000)={0x1, 0x1}) 11:02:38 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/consoles\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) fchmod(r0, 0x0) 11:02:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x43}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r3, r4, 0x0, 0x8607) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r6 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r6, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) getsockopt$inet_sctp6_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000300)=@assoc_value={0x0}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x23, &(0x7f00000002c0)={r7, 0x40}, 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000000c0)={r7, @in6={{0xa, 0x4e22, 0x0, @local}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x7aa, 0x7, 0xc, 0x1, 0x9, 0x655c, 0x3, 0x8, r7}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={r8, @in={{0x2, 0x4e22, @empty}}, 0x19ad, 0x1, 0x4, 0x37, 0x6}, &(0x7f0000000200)=0x98) r9 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:38 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x2000004f}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:38 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0xf, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:38 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x4402, 0x140) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) lseek(r0, 0x1, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x6557d) 11:02:38 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x5522, &(0x7f0000000000)={0x1, 0x1}) 11:02:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000040), 0x4) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:38 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x5523, &(0x7f0000000000)={0x1, 0x1}) 11:02:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) getsockopt$PNPIPE_INITSTATE(r1, 0x113, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r2, 0x1, 0x0) 11:02:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) epoll_create1(0x0) 11:02:39 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0xf00000000000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:39 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x6364, &(0x7f0000000000)={0x1, 0x1}) 11:02:39 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0xf00, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:39 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) socket$isdn_base(0x22, 0x3, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000002c0)) r3 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x374) r5 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x64a1, 0x620c40) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4, 0x2, 0x2, 0x4, 0x2}, 0x20) setresuid(0xffffffffffffffff, 0x0, r4) ioprio_get$uid(0x3, r4) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000040)={0x8, 0x3, {r2}, {r4}, 0x3ff, 0x7fffffff}) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f00000002c0)) capget(&(0x7f00000001c0)={0x20071026, r6}, 0x0) getpid() 11:02:39 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x7ffff000}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:39 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:39 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x8912, &(0x7f0000000000)={0x1, 0x1}) 11:02:39 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000040)=""/85) lseek(r0, 0x10000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f00000000c0)={0x3, 0x8, 0x4}) 11:02:39 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x8914, &(0x7f0000000000)={0x1, 0x1}) 11:02:39 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:39 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x8933, &(0x7f0000000000)={0x1, 0x1}) 11:02:39 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xab05, &(0x7f0000000000)={0x1, 0x1}) 11:02:40 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x1000000000000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:40 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba1390fc35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:40 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xae01, &(0x7f0000000000)={0x1, 0x1}) 11:02:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000002c0)) r3 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000000c0)={0x2, 0x5, 0xfffffff9, 0x2, 0x5}) r4 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000040)) capget(&(0x7f0000000080)={0x399f1316, r4}, 0x0) 11:02:40 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x7f00, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:40 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xae41, &(0x7f0000000000)={0x1, 0x1}) 11:02:40 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6803890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:40 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x28ba047c982e379d}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:40 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="326950d1", @ANYRES16=r3], 0x18}, 0x1, 0x0, 0x0, 0x4}, 0x4881) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r4, 0x28, 0x6, &(0x7f0000000300)={r5, r6/1000+60000}, 0x10) r7 = socket$can_j1939(0x1d, 0x2, 0x7) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r7, &(0x7f0000000240)={0x1d, r9}, 0x18) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80002000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x6c, r3, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}, @FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_PEER_V4={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x22}}, @FOU_ATTR_IFINDEX={0x8, 0xb, r9}]}, 0x6c}, 0x1, 0x0, 0x0, 0x24008040}, 0x40) 11:02:41 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xae60, &(0x7f0000000000)={0x1, 0x1}) 11:02:41 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xae80, &(0x7f0000000000)={0x1, 0x1}) 11:02:41 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xae9a, &(0x7f0000000000)={0x1, 0x1}) 11:02:41 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x1000000, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:41 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x40042409, &(0x7f0000000000)={0x1, 0x1}) 11:02:41 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x40045431, &(0x7f0000000000)={0x1, 0x1}) 11:02:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f00000000c0)={0x9f0000, 0x6, 0x8, r1, 0x0, &(0x7f0000000080)={0x980903, 0xfff, [], @p_u32=&(0x7f0000000040)=0x4}}) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:41 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x42400, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000080)=0xba17) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140)=0x2, 0x4) lseek(r1, 0x1, 0x4) prctl$PR_SET_TIMERSLACK(0x1d, 0x9) sync_file_range(r0, 0x7, 0x1ff, 0x6839005a3894a873) fcntl$setflags(r1, 0x2, 0x0) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x80, 0x0) ioctl$SIOCPNGETOBJECT(r2, 0x89e0, &(0x7f0000000100)=0x7ff) 11:02:41 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6810890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:41 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x400454ca, &(0x7f0000000000)={0x1, 0x1}) 11:02:42 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x7f00000000000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:42 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0xf000000, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000340)=0x3) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r5 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r5, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000080)={0x0, 0x4, 0x4, 0x40000, 0x401, {r3, r4/1000+10000}, {0x4, 0x1, 0x4, 0x9, 0x6, 0x0, "fffe3123"}, 0x1000, 0x1, @fd=r2, 0x4, 0x0, r5}) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x52000, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r7, 0x8010550e, &(0x7f0000000300)={0xc7900000, &(0x7f0000000280)="e9ce63d3c7f8394f1ad0a0e18f05aa603a1e7001eb08ef18cbae24a58ad41c459b3a0ccaa10745f51249c5f6a18dc10a43b721b9d392fde9587f5ef2b966514e72ec4c14a8b7"}) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000200)={0x5, 0x8001, 0xcc, &(0x7f0000000100)="4d5d8718913e0929efc700658644cc63eb3604f8119f72648437492005d8b7a49a738f0b45d108caa1e7579cddec8f340a1c3dfcbe82014559ea2b2be94cb5be5caa1f54cf2ef75f8bdfa0c8f5be41872201677bd71285b7d8cc3e9a2f426b4276e631e57f2a56813ff8f13bab8aeecbb0aea3e2425f7e08e1c059a23d742c639f8d30c96adee9aba81a2d1e3f8a4304a0085409234665229d973c50b52e9f9b2f98f65cd9e0a0ff1de61f6b338c0a0726bf6a44e511ce947a16fe07244f9a2d49546b60e174c881ecef04db"}) lseek(r2, 0x1, 0x0) 11:02:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$KDDISABIO(r1, 0x4b37) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000100)) connect$unix(r2, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) 11:02:42 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4004550c, &(0x7f0000000000)={0x1, 0x1}) 11:02:42 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890339fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:42 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000040)=ANY=[@ANYBLOB="a3cbffff000000000a004e210000003f00000000000000000000000000000001ff010000000000000000000000000000000000000000000000000000000000223408cd72000138fad7280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000010000000a004e220000000020010000000000000000000000000001ff0700"/272], 0x110) lseek(r0, 0x1, 0x0) 11:02:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x43}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r2, r3, 0x0, 0x8607) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x23, &(0x7f00000002c0)={r5}, 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e22, 0x0, @local}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={r5, 0x2, 0x68, 0x3}, 0x10) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:42 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x7f000000, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:42 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808891039fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x12b400, 0x0) ioctl$USBDEVFS_DROP_PRIVILEGES(r1, 0x4004551e, &(0x7f0000000080)=0xffffff97) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xfffffffffffffff7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000080)=0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000100)=r3) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) lseek(r6, 0x1, 0x0) r7 = fspick(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) dup(r7) 11:02:43 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x8dffffff00000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r2 = socket(0x4, 0x803, 0x3) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21}, 0xc, &(0x7f00000002c0)={&(0x7f00000002c0)=ANY=[], 0x3}, 0x1, 0x0, 0x0, 0x20049045}, 0x8000) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r3, 0x300, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x200449c1}, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000240)) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:43 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4004550d, &(0x7f0000000000)={0x1, 0x1}) 11:02:43 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:43 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x8dffffff, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:43 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x20000163}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:43 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4004551e, &(0x7f0000000000)={0x1, 0x1}) 11:02:43 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) setitimer(0x3, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, &(0x7f0000000080)) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000240)=0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="f9b1b8805ed4df38ccaebdf9754335d45b338b19991c6459f8b1e7ca418d6efb13bb901389f5a216077ed86c0d9616bc031205a3595563a7c8", 0x39) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$inet_buf(r2, 0x0, 0x23, &(0x7f0000000200)="7b167eecf4e61af0f4d2809f2bba2e0bbb7f6fdaeed174e6dea9ba1d66a0d38b8136c5d4", 0x24) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000000c0)=0xac, 0x4) 11:02:43 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x40046207, &(0x7f0000000000)={0x1, 0x1}) 11:02:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000200)=""/4096) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r5, 0x6, &(0x7f00000000c0)={0xebd4, &(0x7f0000000080)=[r0]}, 0x1) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:43 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x40049409, &(0x7f0000000000)={0x1, 0x1}) 11:02:43 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0xf0ffffff, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:44 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x9d372e987c04ba28}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:44 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x7fffeff1}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:44 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4008550c, &(0x7f0000000000)={0x1, 0x1}) 11:02:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4}) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e2f66696c65301378696d655f7479706524766274310a92ebc6f3c59e27327e8077626de6"], 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x4004810) getsockopt$CAN_RAW_FD_FRAMES(r3, 0x65, 0x5, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x800, 0x0) ioctl$RTC_PIE_ON(r4, 0x7005) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:44 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0xffffff7f, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x4}) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x13c) bind$bt_rfcomm(r1, &(0x7f0000000340)={0x1f, @none, 0x4}, 0xa) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x202000, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x43}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r3, r4, 0x0, 0x8607) ioctl$CAPI_INSTALLED(r4, 0x80024322) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000002c0)={r5}, 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e22, 0x0, @local}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32=r5, @ANYBLOB="06000000b5910400dbe8"], &(0x7f00000000c0)=0xe) r6 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="0100000000000000001c203a2a06c0c99833d2807540b55e8681d67c920fcee9e8470bab8a43d3e17cf2fc6cee8cc9bd858dd26c"], 0x14}}, 0x0) r4 = socket$can_j1939(0x1d, 0x2, 0x7) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8}]}}]}, 0x38}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[@ANYBLOB="1c00ff00", @ANYRES16=0x0, @ANYBLOB="00022cbd7400fedb07c9000000000000002b00e3810b19e18e7eb8b9b73f60de54a13f2b9347f5b847ad80b549beb74d122ab2197f4498ca396acc2777c2befff2ac16376e3176854e80f13e44935621ca2695237883ef5fa76fd4a2802645107f97776538b60b3e3f98ef17e102000000ae07288b8ecfce5cd50f82000000000000000000000055e7ee1dfe3d3d4554f201b3550849d789865950d7ffb26f8258c243f841dc9234782c041d5338f3927a45812c7b35dbefabf300a2ae52f1afdb5cff02adee2e25aea86f8ded0a719bbc2018d13914e1db8b1ebf16d586d71061ce324945019661e5ac36342ad40b2ee7c748f87e18d7444a445ea0797e"], 0x1c}, 0x1, 0x0, 0x0, 0x8010}, 0x20000000) bind$can_j1939(r4, &(0x7f0000000240)={0x1d, r6}, 0x18) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f00000007c0)=ANY=[@ANYBLOB="d8010000", @ANYRES16=r3, @ANYBLOB="100029bd7000fbdbdf250100000008000100", @ANYRES32=r6, @ANYBLOB="bc01028038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400000000e040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000700000008000600", @ANYRES32=0x0, @ANYBLOB="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"], 0x1d8}, 0x1, 0x0, 0x0, 0x10}, 0x1) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r8, 0x1, 0x0) 11:02:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x2e, 0xc, 0x7, 0x6, 0x9, 0x0, 0x2, 0x4d, 0x6, 0x7f, 0x6, 0x4, 0x2, 0x2}, 0xe) 11:02:45 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f103686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) dup(r0) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xa2bf, 0x8000) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x43}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r4, r5, 0x0, 0x8607) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP_VS_SO_SET_ZERO(r5, 0x0, 0x48f, &(0x7f0000000280)={0x88, @empty, 0x4e21, 0x2, 'sed\x00', 0x10, 0x40, 0x36}, 0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r6, 0x84, 0x23, &(0x7f00000002c0)={r7}, 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f00000000c0)={r7, @in6={{0xa, 0x4e22, 0x0, @local}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)={r7, 0xb9, "4991714ee2f544c22f85f4e7bba163c1c2eeb0321f596f2cc53cb0c3f322f1aaa21467cfa3fdb7abc0f0ef3f215e24210c8f96f902833e37b3c968f6de96f367a6426b280bd054abaa48877da06d75cc07a4742ab06f3fd44228c07f65cbe77310ba5e4e0f21f11467488c06c28371fd404ab3ceb9062aff97d117897c9395f0c501770929540d7c2f73de07bdad8f0d57d033e194fd94d373d9140f1eb62d761bc012aa50df93eb0194d38f410930d621f2b91492b5582722"}, &(0x7f0000000180)=0xc1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000200)={r8, 0x15, "3f9f9f51bb07f27c99b6a44c3b4e2336d008533946"}, &(0x7f0000000240)=0x1d) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:45 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x4}) lseek(r0, 0x7, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 11:02:45 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0xf0ffffff00000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:45 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4008550d, &(0x7f0000000000)={0x1, 0x1}) 11:02:45 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x0) 11:02:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:45 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0xffffff8d, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:45 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e368639108b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:45 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, 0x0, 0x1, [@remote]}, 0x14) 11:02:45 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x40085511, &(0x7f0000000000)={0x1, 0x1}) 11:02:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:45 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x4}) lseek(r0, 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000040)=0x1ff) 11:02:45 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4008ae89, &(0x7f0000000000)={0x1, 0x1}) 11:02:46 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4008ae90, &(0x7f0000000000)={0x1, 0x1}) 11:02:46 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0xffffff7f00000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'bridge_slave_1\x00', 0x400}) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8}]}}]}, 0x38}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r3, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000829bd7000fedbdf25050000020500330002000000050029ed0d000000000000007f00"/46], 0x34}, 0x1, 0x0, 0x0, 0x4000801}, 0x1) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = fcntl$getown(r0, 0x9) capget(&(0x7f0000000080)={0x19980330, r8}, 0x0) 11:02:46 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0xfffffff0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:46 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x374) setresuid(0xffffffffffffffff, 0x0, r2) ioprio_get$uid(0x3, r2) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setresgid(r5, 0x0, 0x0) write$P9_RGETATTR(r3, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, r4, r5, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x11000000, 0x92b, 0x10001, 0x1, 0xfb, 0x4, 0x42c4, 0x2, 0x3f}}, 0xa0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0x78, 0x0, 0x7, {0x0, 0x7ff, 0x0, {0x5, 0x2, 0x7, 0xfffffffffffffffd, 0x7, 0x398d, 0x3, 0x4, 0x40, 0x0, 0x9, r2, r5, 0x5, 0x8}}}, 0x78) lseek(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$IPSET_CMD_FLUSH(r7, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x48084) 11:02:46 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe03c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:46 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4010ae67, &(0x7f0000000000)={0x1, 0x1}) 11:02:46 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4010ae94, &(0x7f0000000000)={0x1, 0x1}) 11:02:46 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20000, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="0400e27770a10b562058d8f3fcb71bfb664ff594cc4dfdde48be5dabc3c96a4c64cef904c9e13ab8f7415cef18fc035e5c3ebaec9d856c2551100100000000000000a5acc8bda3479d508a4bb7997fb325c9b14460000800"/113, @ANYRES16=r1, @ANYBLOB="000828bd7000ffdbdf25120000000800340001000000080034000000010008003100350b0000"], 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x20048851) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000300)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x54, r4, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x2e, 0x7, 'system_u:object_r:audisp_remote_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4010}, 0x4800) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$P9_RSTAT(r9, &(0x7f0000000500)={0x145, 0x7d, 0x1, {0x0, 0x13e, 0x1, 0x800, {0x2, 0x0, 0x7}, 0x80000000, 0x10000, 0x401, 0x8, 0xf, '/dev/dlm_plock\x00', 0x12, '-em1%securityselfC', 0xc0, '$:cgroup\x1aem0%vmnet0/vmnet1(eth0vboxnet0system\xe8\xe6\xf8\xf0\xb4gXR\xd3.\x8c2\x85\xfd\x83]Ho\xe5\xc9\x7f\xf0\xc4\x11\x10N\xcd\x98\xb4\xe8p\xc9c\f\b\x9eG\xfb\xd6\tp8\x1c%\r\"S\xb5 \xa9\x19I\xcfu\xac\r\x95\xdfH\r\xe6\xde\xa1\xc7ZEf\xb4\xa2.)~JA\xf2\xad|\x80W,\xb1Kn4W\xc1\xba\x93\x17B\x90\x17\x9cg\xec\xc1[\x8c~ \x05\xce\xe4\xad\x16^$\xb6\x9c\xa1-\xa4Y\x19\xb0\xf8\x06\x15K\xa6\x9d^oj\xce\x1a\xa5\fq\rF7\x14b\x9f\x15\xcfBs\xb4\x94\x12\xd9\xdb\x95\xe3\xfd', 0x2a, 'system_u:object_r:audisp_remote_exec_t:s0\x00'}}, 0x145) ioctl$KVM_PPC_GET_SMMU_INFO(r7, 0x8250aea6, &(0x7f0000000200)=""/105) lseek(r5, 0x1, 0x0) 11:02:46 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x40186366, &(0x7f0000000000)={0x1, 0x1}) 11:02:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:46 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4020940d, &(0x7f0000000000)={0x1, 0x1}) 11:02:47 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:47 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) connect$vsock_stream(r4, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) r5 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000003000)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f00000000c0)="5531f5e79d12300d0e98e2f96ff18ba13900c35e51d75c5a68088902893376755a39fb", 0x23}, {&(0x7f0000000200)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3ad5e39affc9ff98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x6d}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}, {{&(0x7f00000002c0)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e22, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)="f0e7512cc62a8afea5ea2fbe1d", 0xd}], 0x1, &(0x7f0000000380)=[@txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffe01}}], 0x18}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000004c0)="bee3b5fbe351288aed62cce9d84dbac8d227f6bcc5b22f24bf0f3fecfdd34c3fa630e36852e34a0c1c693460cf0c759445fe519adfb1692649fd16cefba4d150202cefdb20858806e97f0f277f3922bcad55fbb53c30023768023a664d8bf3ea41eaf1ba5603280655acc4380db37d2b53e5e23c51603ae3a46298cd9ef08d53df0d8a4193026e868a90dd9c3ba79f427e9f947b4af6e38feca9b5ed769afb36b720dcbc299bdd68dc992c2c7216587da246f7c45f2151fcc7ac02b05a1a471495b5e6e7e5a5bd55ba520157c9716a2c4e1c70947b034ff3", 0xd8}, {&(0x7f00000003c0)="5d41881c1da4448eb63d6ac4f79f03ad", 0x10}, {&(0x7f0000001000)="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", 0x1000}, {&(0x7f0000002000)="707c305469238149df71e2c7f12ab33b948d648bffa0e81939b7119492608052271d3c66225ed9fdc0709e6ff74b0be31863e33fbef27edff9396ef6eb9d704fe8764da67916f74da255fa182ac11c216168aaa303debb52e0c2b7175ee99622ae51a8ca7c4194e8423257ce28a8c65e5e5323c20e9fe2a066b73dd8a0d7972b77d655b112633eb31e8036fd51ad9e768f5fe7c8da16d05d35fe4d6d13a9950921732d74ed5e067354d97a6b80e9b7c2dbb87c634ee8a95fe0192e20349ab43f47cf907419d0c5935f9e48c0f01fad6d850242eb9b73b70bafbb475ee62ce8db43d40d16a0820ed08ceec13b2fdff196ee28f9816d51cc7ef12ddad10ed6124473b305b53d3203d552fc08014d3de239ec5133f73c917551cc8f188c53d61530756ddffc38b764052e086d87086268a575f61b076582399131b93c1bffb0f2b4465c5260d8a2c871cd9680e1c27f11bbef94d393b2184ed0a808849d563fdf4c4f58e5cf38d8e4793adbfc4eae41e921d8d23dab6510c9b0619dc06a12a3a4e8f0827b8bcfa477bb839e777b1e13bf4172e98153624409d9d260678125592ef2cc313660fd953964769875955dab8cb9f6c4feb69f2fe4bed57cb55596dafc35e3c53455b441bcb14d57a21ecffac249c4b0bb102c67d5383bb5091903dd3117b9b7e2b588099ba993740466e5931c0654df8e1ff652a73e9974ccd45e30d86a0bae31ed68d8a613e84e49efd43099591ed7a2c71d327df133744fe4ee388675c11a019e374be50a8db47a78cb6a07f164a156e1d553b9b1c823edb99c7f770742c9f0690411dabdebb44272d88b8c06af623711a8e45d67bcace3c69bff4f82381fe93cb633622d428bd076c7097a74dab4e3e56f20f11d314c708eae2e94103f15385f0a3f0d8a21ff0db7b51e86bd4bd4c23a7d4e8370f4f19462198f63a8b7bf8ffb695a91ac2fcd789143427a905a77d53a3fb8e71a262eafd37ff3cd3a0b9f8f7af7331827f12d4bddfd5c395a88078842f497e123688b2f43f5672539201a61cd736a1bf3b971b25ac6a154c077a180bdcb5866d0a7e0e2170f7b9c3e7a81537c7dfcc6fc1814e04cbe15f3b422871180d61238862c176f7e89886fe129ae4bbc97e2c6dd907b353f039ba60b7803059d11ef5795c6d51261a4b3464bc672b8f663e424459f895e1c998e1565303c4b5dbbd18fccebc5865049eacf00b9b4187543abbaaf63c4ae30047d383cd46c1725ce2c852ebc5a17234cdc3aefe1b9b11c9cd3261f269ed378f117d409075a1c9de144d13f435e1b0c68a7d2cd1a9d359add46bf510675d356e22a4a523c8b524214b72a3ab4b46acfd1228fcae940460d12233222f6237c5e156815a60d484bf58bc1e47ac4b2975d81a24529dd049258e76b5265c2df074e57b5a89823a16dc3127d44ed5320f2d8b3f59320f2ad017d5205bddd691d763fc29c3492027937f2ac62bb9c78cd697626ba4bd77957dcc6c193c385decf363e784bd13491e4bf78236c1a01929995381d34b260c35bb98da6ad98ea0acb3cf8f4c1ba9a2a5591ae490b22beba6c5dbd4d71f821146229b33661e4781b35b45a80e244edd75b7c35a8c19ded24b3a89c698af2f956d60a4e71b43713e237d2e28d54ce9e91379a86705585ee43135770f8681f16d3f8c420aebb02bcf485d1f398f5ad813051afdd7f3aad7cfdea3b6e5531ad837125c8097676e46dc5842b32d94c97697ecd25b62e0441646e66b12b8ca97954bc45a75634994b0579d16a4c7c075f90fea03e10a66adc4656564220ddba5e6057b39dd71ea42973bbccb2351a2e85ee98c7e840363a20e40b19f0f63290d73f3292f42e26c589adc9c4ab67d36015d3de0299d15da2b62c100e122ba59e85f14ff2b233e23e5fd47345f45bda72f52a01431885e60d7e3fcbece24c7390ff351b7ed20fab10073ad29ab81cd341251aa926e2ffc66ee810908ab33ee3f0c36d9c231814186e9e2e6959f2ac3710966bfd5c731b3ec849fde8f5987696d49f94104a2efe6a949b2577a22ff0fe0ece4f531f567ff23e87ed827bd61ade67f5663648c7f3883ae91140ab1b3fec8d6e81f0894b9736fba4a1c8dda8770f143c78232fe9c28a5424670242dea34360b381afd8e2889a05d88f6495ded2f44ed5792e333a1b5766bce3bc2aac254b280c9aecaaf5b18e48dfde28259c8358aaf96e2fded5fb64685c16078777065e4737e4887e877fef0a3f4e5f60212c091989f3d8715b813daf07780c185c69e14e36a893bdb6c4b0262cb3f4661da8516e93e8d803c06a8aa4eae75c422ba5e8a82302ae52707f7167ac7f083b11dfd71e189f7186eca39289f4c6dfc6c92c8ab52555515b9b3c80337031c7fe9210e0ea7159c6b7ea1ac8d6b353c824ed8d37516ecaeaa2f877098d525691d55f7d62f72fe3b17cd38de1d6b7a32237d657fd2255cdc2b27e6fb526270dc4e94785cadf87c457fad8bc4c6d0e87d89ac036ccddb2cdb0bdb659180f42687b5ab2d60c6277877a73f991449dc2cc15358876c8a2cf05cbde10ba5505e2bacdf8980256f8ac7ec0b5b46c2872b6a563535775cfef13783b559503ffa5ccca7cb9b303b0d89cf3292fd4bb183b10b920c9ad9e3369a98793168201eb19f65ecf4e383a243fae8e5b3194d469da9ae77fa69c38d7d65d2bb0c044f6a4ab88f5004d385e36c0e85694a3819744fb147544b3a3e53fedf1f7a20b574a4549b605d4f2f26fca0fa77447048e7e7be007e376bc596c82d614729cde3cd02746167f3fab70601e37868948bcb1a48710c724f049f132be8811d809937c99fbc9e7472dd675b948c190f1f0dbc696dd53549067b7957f95604a8521cb161685966bf77c7111560a6b72c217debc21eeb435ba0aab4bb1e5dbb2caa6d0f3ebcfcc8a4447eb5066debe09054d92d198f43f162265e9388590c57a9c070c4cea67cd147e820bca67890c6836a725171f58240ccf0d5b5df664635a4bcc0cb86fc1f1ca744efe9ca1ec09e3d7bace32da68a8fdb3887c73836231da9a3851e2221d48b8c20d1c2af4e2d0458c0a85bba85f01c1907d785497a56da470d41b2271a1844a74d666dfacfec9e0ca69fd8c94fa4dc2c21d315cd3bd01b73a32fec93fa4a894fb499465aadb16beec765d49c775112e73c16b505909423935dcb93b230b3490d0600229c950d627835ff6360f23f08fc60ef603ff6f6d16e14d8c1847c94d851c8efac8766906b9103c0be5dfed38ea341b69fe49a778365c641056c5ae400ac68f6928ada814be6347795dd4c2866fad7b1d434e89338bccb8cc0186be1c4ddb0cad6e0264188ad297e0c899577654ec19424196453cd919f45e7e302f9b8c8829bf316959dcead4bfc69dfc0c83bedfaad6756444bc0eafb6cb8888df4a62caab217eca7c0fb09a50edbd0a95d3ed1c156592fae4f64881e19f89bb4d2ccc3d4a307c046f4261cea0a8d73bacb23d6a3d83041316a75174e0ecff78aef0ac9110556c80136c8f136bc6d332193e9014a2e5cc3c8138416eacba53ee72fd062fc1f9c98619f198ced85d507f1e20a9d48303e768b642ceca8eb6407c59d9f564b90066cd0f16e25ee6db0a9328d031fbd8e8674b4c7d7956ef79db0c2603b72adf8cca1d802e017f1916b5ded67665fa10819ce635baedc7f7c412599ea9ce9c84f1d78b0f19257ca77e62dfda12adb593a22c0463ae9eab9daef64d2fc36dd05e2a994b02b7fff1f7b07f6de464559633747117450ca691a5b3b16cc997c805cbfb3d53224dc25c4187637dc8f56dc8b3e3a60f8ff7acb8a79cd825d8a9527028e0cc1c064d2cf0a6f9bee2e05afbd999a727e067ca8e2eda5818982c77278b69da25f01cf97f0c4213c66720aba4340d84d9cfb2ed07c8644ee9f07bd2009d30cddaaf0cc7c44bf36862b3ef338e83a715916ff4be616de9fbcff20369947f3a63b0e532960c37c71b4b3aca1b9b129615d423cfc651145caf1baf3cbccc7a903d9342610a69efb33840511d5477789530e6d35fba64de385439c1126746c6fc394aedbd5d3d4cbe2ed336492d70dc9387f046f925fb7209bfc62c2d602f3cb05b18950a1dbedbb6838de48619f7893a5d7440c3391464024d762eadee2ae5005b221a2b036fee0a028874f3384543230e49c787ae197a28430e229916d1797522e60a2819c943986f362f9b2c956bb269771158e066214e2529ee7d6ce22499ca1181bc529e4ef47855241cea57d262de3f69ac2ba935d7cb9ca5b183764f568c4e55de628857b521597ec469ee1603c2c7bfa55548a6eb7d24b0dfbc71d8b4231901b1568d0115c1377ba541d3d2033f76c78d830bed24c694fa2b76adac680295e7905edabddb2fe134eeccd06f605c7a157ba37816a90727b24f248338725eb6ffc4f7883d3b89d458e1bb3bcacae4a2002f8b27cc03feab2c0f3f9229dcf955ff5cdb83e14e1353eefd5e5c072417a665138473ad549290b3e83d43d616057af56fc5b82d7ab72b4ca413e93b669d4258d419cb67b21d5c261dc1d5c934fb9a58e0ad2bc1f98b22e93546cb641ca22649b8c6c467f18fbd65f209fdf4964bb57ac957d15ed2ce920e52d30316990be2568d63e34301a6e51ebce4f022cda03262b76e87ebbd3b49649b1e4b2a33fc9cde4d8a1a2ff48d47312717d917f6cfdecd0cd245eea0aa5f040bdb950a80dc0481cb408467592e5963f3cccc3cac282f93c10d8f4e01ea2db5a6cfabbb3041d148d597273f0bc4205d07ee6a003c3a0b87dc3fef6c7e0cba17e5dda72b4d03ceabbe266472380a7bd8c1753b762d7acad4973cc2efe84e397548aa51293eb01d24c6aef0e09069c38faac9d8ec45b85a086f7c7326e694e3ae085fb5d806fcd9d9afd3a3f182b3783eb3ebd9e675b18affb5126689958553a6548d9e68502542937edc1f3481bfb7504964827bc03438316777a17beb7f73437ee99338510a8c79b3debcd4ac48fc40fc7db80472bb250d59fd51ee46891ad857012714311667ba10d0e9af2ecc5de27a6d98c14c1a07c4f816ceb29f2abde35ebd828c806de137ad73f39414ca98dd70eeff2fd5915dc1d36a8e78e0af52764e4a9e2f1beb92dcbe6a4367199d90df381c1f01487f97b0aa5defdc616543e5c6f5056dc203f9b0dc24e6daeaa2bd9ad357b65c4f67047f014b277a337086211995483eb5a4415858a22ae7b67c4865ebf656b92bd497ad83a16bcb10729eb15c7a393948bfced5abe8921d2e0e4632d28c972837bdfc9dd13810df7a570c5af9efb5a4ca18b2ba8adddf698740b263e5e7b67a62a5259e6f02be6e48d4adb4aea56ca793679a4bb5da25f60d7b325b81c2c0a93dcbfffc3f6c0c368cd895a154e6b81fa1b413f9272564030ca3b0389a2cca5c10cb6f48673b92e23a51b5932945d2b4637264c08bbd7ebf415d8fb0ec5bb118d836e8ab8f7fd1c562a7d8eab07404993ab7e7eb24b7ad8f1fc5cd0e5a3f6c6ccf4e4e494b455501a263012cfe834753fee45de43ac48de36aa8966afc9f0cfb3da1d106822113868449a7c8756962363853e8d0bf85b381a88dd47aede6d2f467e5370365e8f02bd2e431ef3597b186fbfd1c6d45aae0779030cfa5a0c67b75735446aa159a55112ae8252c0f7ab7e52c0568bac436aa49eaf62fcdcf3566e21f95ed49f74dcdc7b8c1b6fb0d3710f52b7fcaec4d5fe24fd80b64587e8791b160ed6f0ac829010b8af0293bba379bc7a516a5afcfe35d8eea0416498c2ecc2ed12cb3c90c8daefa", 0x1000}, {&(0x7f00000005c0)="04c538951b82525fed24876f13a2f2a1fff7acc192e99ca4cb372d386a3eb5a10e9a7f93032364b09b894b537e0e5fe7d567697876555fc541e875a5f419399e251082549e8237095e1a", 0x4a}, {&(0x7f0000000640)="cd00467b9a9745936d05a955fb09772d0d288bf4287e2c8d691fd87f7a76b628511d2617b6759837c79514bb3a4dfe9331fb0322c48c16eee0f9c2f66da94f0ac862c36a0b5498f90692aec6ca348741dcd315969ba5343d796d0523cffb7540b4e782f984c6d6074c30856a06ecb1deb97117496317731c8760ed45ec213483440126", 0x83}], 0x6, &(0x7f0000000400)=[@mark={{0x14}}], 0x18}}, {{&(0x7f0000000780)=@llc={0x1a, 0x6, 0x7, 0x6a, 0xeb, 0x2, @broadcast}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)="d8e5f65f103841d2964683e73da7ebf7363b3cc32feb7cb3f7c1a7f1ceefe3f6b8e850a74fa4645354fa83e85aa65c2345e5711022d15b29d0cf2361ef089582df56a3003cbb20891a2a6959ec664d79b297c9713851dade6469f17f719aac1730d5839370c16c4ba906d1c534127ac8b98a9dd97850da9704c451ca67fe4b3c18cf2a07d78bbb0ed3efaf803873e8dd1e58ff0a5d6231f9e63c2e430d3cc2abf26dca8fc2ee52a796de6376e98b5817f2e9733d1136a8a172df4a748844e382fa895b", 0xc3}, {&(0x7f00000009c0)="e6fc0e5a340145f0ba6e5a6b8deb052f350cdb02be64532edc4d066776f05b39a2ebec3ae63072f76d2fbb23911c5d874e2d342fb8d9d7b6486c71183ffd32767f388bd8ed5c78ad932aadce15c42e459f24f12b33cddf8a75b3aff7f237d067fb72", 0x62}, {&(0x7f0000000a40)="933e2ed232cec34ca826d73616b4416a8eb083a768ad350faccb596c22cee775d230d365246ce46cec8c6a874e5a47de32667a14480312e2cd3771e6f660b6c9dfa4f80ac0b92377828b1c83ff3545aa9cfd624ae4076e2bac74f8e3ddba6974ed54b352ca4a77b7ff6f4004326332b4f169ae19dcf658f6241adfb6cf7b1d458d5e42324678f2b4462959", 0x8b}, {&(0x7f0000000900)="9b87b972f20385251a7568669062350a91b7c9eeff", 0x15}, {&(0x7f0000000b00)="17b073676dfb1dc4a46ef03b93ef4d9f556eb0b0924623edd4c4b5d1fc7de616692be0fcb0d19cf17ee8acfaa67eaf0b8e3927b702bc8ba6a135dba8d32c8920599b3881f84c8684bc5d5763645f71e31fe65e2746b9bcab521978b901bff8f7b01e94283558383ba1a4d821f659c5f345800d7bde971187e20485810bcad7827e580b741db93ea7709becbb11963d0a63437d25cd3c1e94de2e1bda51714b833fd511b9b424deb708a797ce87efc2a809cac727ef70d7f9b92d04425a8590ca797e4e7dcf21b4acddca63f5ea353120ee77f3", 0xd3}, {&(0x7f0000000c00)="1e5ccc8ca157b628cb74c0ca2f75f5be1a396d9db6270b5a621cfc85240795a4dcede661bccbecbbbc0fc2f4edb8402766fa5c5c1fc83a3b13dbfe1f88fe227bce0c7325a76423700da69e60cc12e28b2c5f1c18d2f193a77054e0f8edcf4f58677b54f5d13853bd70987fcc4a5d5fa32f6bf116bd208b5526127c09939b68f55be1b9bda2471dd3b9dd710bec8e5c5394be6ab66ca6954ec5606ea179cdcb20447221d116d08e2614e88461de95c90bcb4040bbdc3cca783cf0c17c8b82f356441794cd149a4e3b44", 0xc9}], 0x6, &(0x7f0000000d80)=[@mark={{0x14, 0x1, 0x24, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x90}}], 0x5, 0x24044881) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000040)={0x2, 'macsec0\x00', {}, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:47 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4020ae46, &(0x7f0000000000)={0x1, 0x1}) 11:02:47 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="028ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:47 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe10c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:47 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4028af11, &(0x7f0000000000)={0x1, 0x1}) 11:02:47 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4090ae82, &(0x7f0000000000)={0x1, 0x1}) 11:02:47 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x41045508, &(0x7f0000000000)={0x1, 0x1}) 11:02:47 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e101b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:47 executing program 4: lseek(0xffffffffffffffff, 0x1, 0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000)=0xd25d, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000400)=0x90) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setresgid(r3, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, r2, r3, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x11000000, 0x92b, 0x10001, 0x1, 0xfb, 0x4, 0x42c4, 0x2, 0x3f}}, 0xa0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @remote}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@private}}, &(0x7f0000000080)=0xe8) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setresgid(r7, 0x0, 0x0) write$P9_RGETATTR(r5, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x2, 0x0, 0x1}, 0x88, r6, r7, 0x1, 0x3, 0xf0b, 0x400, 0x100, 0x2, 0x11000000, 0x92b, 0x10001, 0x1, 0xfb, 0x4, 0x42c4, 0x2, 0x3f}}, 0xa0) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f00000002c0)) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x2, 0x0, r3, r4, r7, 0x8a, 0x200}, 0x6, 0x5, 0x6, 0x8000000000000000, 0xffffffffffffffff, r8, 0xf801}) 11:02:47 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4138ae84, &(0x7f0000000000)={0x1, 0x1}) 11:02:48 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x0, 0xf}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_RELEASEINTERFACE(r3, 0x80045510, &(0x7f0000000040)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000080)=0x4, 0x4) 11:02:48 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x4400ae8f, &(0x7f0000000000)={0x1, 0x1}) 11:02:48 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d1065a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:48 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="038ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:48 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045430, &(0x7f0000000000)={0x1, 0x1}) 11:02:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x400040, 0x0) 11:02:48 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x400400, 0x0) r2 = socket(0x10, 0x803, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x240081, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000200", @ANYRES16=r3, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x20049045}, 0x8000) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x82000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r3, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffff8001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xef}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0xc000) 11:02:48 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045502, &(0x7f0000000000)={0x1, 0x1}) 11:02:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) fchdir(r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:48 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x3) 11:02:48 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045504, &(0x7f0000000000)={0x1, 0x1}) 11:02:48 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x0, 0x10}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r2, 0x8982, &(0x7f00000002c0)={0x1, 'netpci0\x00', {}, 0xfff}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r6 = geteuid() ioprio_set$pid(0x2, 0x0, 0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bind$alg(r8, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(echainiv(morus1280-sse2))\x00'}, 0x58) setsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@mcast1, @in6=@private2, 0x4e23, 0x1, 0x4e23, 0xff01, 0xa, 0xa0, 0x0, 0x8, 0x0, r6}, {0x7fffffff80000000, 0x712, 0x1, 0x3, 0x8001, 0x2b2, 0x8, 0x8}, {0x5, 0x401, 0x2, 0x80}, 0xffff, 0x6e6bb3, 0x0, 0x0, 0x3, 0x1}, {{@in=@multicast1, 0x4d3, 0x3c}, 0xa, @in6=@mcast2, 0x3502, 0x3, 0x2, 0x80, 0x6, 0x81, 0x1}}, 0xe8) 11:02:48 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000040)={0x81, 0x6}) lseek(r0, 0x1, 0x0) 11:02:48 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045505, &(0x7f0000000000)={0x1, 0x1}) 11:02:48 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a822100b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:48 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="088ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:49 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045506, &(0x7f0000000000)={0x1, 0x1}) 11:02:49 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x309, 0x0, [], {0x0, @reserved}}) lseek(r0, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps_rollup\x00') ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, 0xfffffffffffffffd) 11:02:49 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045507, &(0x7f0000000000)={0x1, 0x1}) 11:02:49 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_opts(r4, 0x0, 0x0, &(0x7f00000000c0)="64ba79111dff0ed79f511f4adb24577f32b45a08a41136df45e0fe7623a918af64505b20b1a7005cc75b5be80c0f3d2898eea51113d366e86dac36fda4a95a1b6dca42379815ff7952418ecf837329670585b5bc2881e345b3b0c26b5af6e4585fc568d4f97231ca9b040cea971e37716c437f97bfa8e00de232c65ad2d5df40ae466c2eced126371f2ba0794588f902510356323d1ca02b50f667c5a7319bda9157852a3279769fc7d0a702eae5ad8de3e4e1ed628398d0a76ce996648892d3aecd1bfeb9dfa3194bc9420b925f49e64c8ae5618cf25a138ddbe86bbbec6c26f8e31a6c", 0xe4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TCSETAW(r6, 0x5407, &(0x7f0000000080)={0xb74b, 0x4, 0x9, 0x41, 0x13, "42886001db712564"}) 11:02:49 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045509, &(0x7f0000000000)={0x1, 0x1}) 11:02:49 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x8004550f, &(0x7f0000000000)={0x1, 0x1}) 11:02:49 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x0, 0xf00}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r4, 0x1, 0x0, 0x0, {{}, {}, {0x11}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r4, 0x4, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x2, @media='udp\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0xc004}, 0x40c0) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000200)="2157c1d6983b27be70e2c10d949cda746db0539cc5973705a8350144bacfb7e263433b137f58ac805daf6a84f2914e7a521f692c97bca5a10e9e51ae1e67402a7b99b6d8b28a19f193660ad61681dd1f5249d8c84454a27c7246df2953021b55bfbe4fc03f9b5b0c037736b1c5", 0x6d) 11:02:49 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e10301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:49 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000040)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) clock_gettime(0x0, &(0x7f0000001340)={0x0, 0x0}) mq_timedreceive(r0, &(0x7f0000001440)=""/145, 0x91, 0x4, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000001380)={0x4, 0xa, 0x4, 0x800, 0x0, {r2, r3/1000+60000}, {0x2, 0x8, 0x3, 0xc2, 0x2, 0x1, '[,Wu'}, 0x7ff, 0x2, @userptr=0x8, 0x80000000, 0x0, r0}) ioctl$SNDRV_PCM_IOCTL_FORWARD(r4, 0x40084149, &(0x7f0000001400)=0x20) syz_usb_ep_write$ath9k_ep1(r1, 0x82, 0x1264, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"/4698]) ioctl$TCSETSF(r4, 0x5404, &(0x7f0000001600)={0x6, 0x8, 0x7ff, 0x3, 0x19, "ecc5ec600d0c5fa0ecacae09dd3dc093020b26"}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) lseek(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r6, 0x4112, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000001500)=""/207) 11:02:49 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="108ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:49 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045510, &(0x7f0000000000)={0x1, 0x1}) 11:02:49 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000000)={0x1, 0x1}) [ 2066.425596][T32586] usb usb9: usbfs: process 32586 (syz-executor.2) did not claim interface 0 before use 11:02:49 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045518, &(0x7f0000000000)={0x1, 0x1}) [ 2066.494292][T21667] usb 5-1: new high-speed USB device number 9 using dummy_hcd 11:02:49 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045519, &(0x7f0000000000)={0x1, 0x1}) 11:02:50 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x8004551a, &(0x7f0000000000)={0x1, 0x1}) 11:02:50 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d02a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:50 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x8004551c, &(0x7f0000000000)={0x1, 0x1}) 11:02:50 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x0, 0x7f00}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:50 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045563, &(0x7f0000000000)={0x1, 0x1}) 11:02:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000040)) capget(&(0x7f00000001c0)={0x20071026}, 0x0) [ 2067.034971][T21667] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 2067.048939][T21667] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2067.059827][T21667] usb 5-1: Product: syz [ 2067.072872][T21667] usb 5-1: Manufacturer: syz [ 2067.078324][T21667] usb 5-1: SerialNumber: syz 11:02:52 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="5c3e5d2a5f9061462da35221157d368f91139106f04d187905af68f2ed1ea6bfa3d2019535063fe7c88a57cc4918bc60352ab2a540525a93fe78740f9c97ddc4a7e087b17e0df3bacac367477db6c994a153ec0d523169712fbf4a68b9ae536085389810f8c89f1c0a4441a5d2c873c190c892b70667a3b5edc82a42cb5c81d8eaad3828f1b4ccc5249111a1584e33ac021b77337592659deeab0bba994970feae3e034194123eaa9306be6e06058fe37a74fd4e642c48460177065a424a8ef0f5eeddcd816df7bac33f1b9a049d9fa2565afe", 0xd3) 11:02:52 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x10}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:52 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d08a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0xfffff5fd, @remote, 0xfffffffe}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:52 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000000)={0x1, 0x1}) 11:02:52 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x0, 0xf0ff7f}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) [ 2069.209084][T25732] usb 5-1: USB disconnect, device number 9 11:02:52 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r2, 0xc0305616, &(0x7f0000000000)={0x0, {0x0, 0x2c6}}) 11:02:52 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x8008550e, &(0x7f0000000000)={0x1, 0x1}) 11:02:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x7, 0x1, 0x401, 0x0, 0x0, {0xa, 0x0, 0x5}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xd4}, 0x20004404) r2 = dup(r0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000200)=""/159, &(0x7f0000000180)=0x9f) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000, 0x88c0fc56678205ee, &(0x7f0000ffe000/0x2000)=nil) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:53 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x8008551c, &(0x7f0000000000)={0x1, 0x1}) 11:02:53 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) sendmsg$NFQNL_MSG_VERDICT_BATCH(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="460001000000000000000005000c000200ff09fffe0000007f08000340000000080c00020005130fc7f22104001f0000000000010c000200fffffffd0000000408000340000000050c000200ffffffff8000000108000340000000f00000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000994) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r6, 0xffffd9ec, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x7, @local, 0x1}, @ib={0x1b, 0xffff, 0x4, {"548944e25ad1da759fe285ee74f22868"}, 0x9, 0xaca, 0x5}}}, 0x118) 11:02:53 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d10a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:53 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x2000004f}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x4}) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x6) r4 = getpid() capget(&(0x7f0000000080)={0x0, r4}, 0x0) 11:02:53 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x8008551d, &(0x7f0000000000)={0x1, 0x1}) 11:02:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_NR_MMU_PAGES(r3, 0xae45, 0x7a) capget(&(0x7f00000001c0)={0x20071026}, 0x0) ioctl$FICLONE(r2, 0x40049409, r0) 11:02:53 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4(r3, 0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080), 0xffffff73) socket$nl_sock_diag(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_CAP(r5, 0xc010640c, &(0x7f0000000000)={0x4}) fcntl$setstatus(r5, 0x4, 0x46000) r6 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$NBD_DO_IT(r6, 0xab03) lseek(0xffffffffffffffff, 0x0, 0x1) 11:02:53 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x0, 0x1000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:53 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80086301, &(0x7f0000000000)={0x1, 0x1}) 11:02:53 executing program 4: ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00000000c0)=0xdf, 0x4) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f0000000080)={0x0, 'vlan1\x00', {0x2}, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000040)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r4, 0x1, 0x0) 11:02:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADDIR(r3, &(0x7f0000000040)={0x141, 0x29, 0x1, {0x9, [{{0x8, 0x0, 0x1}, 0x6, 0xf9, 0x7, './file0'}, {{0x20, 0x1, 0x8}, 0x81, 0x3d, 0x7, './file0'}, {{0x1, 0x4, 0x4}, 0x90e, 0x4, 0x7, './file0'}, {{0x40, 0x4, 0x2}, 0xffff, 0x7, 0x7, './file0'}, {{0x1, 0x3, 0x2}, 0x17c0, 0x3, 0x7, './file0'}, {{0x20, 0x0, 0x3}, 0xfffffffffffffffd, 0x20, 0x7, './file0'}, {{0x2, 0x1, 0x2}, 0x3, 0xf7, 0x7, './file0'}, {{0x0, 0x0, 0x3}, 0xfffffffffffffffc, 0x3f, 0x7, './file0'}, {{0x2, 0x0, 0x3}, 0x7ff, 0x0, 0x7, './file0'}, {{0x1, 0xec, 0x8}, 0x8, 0x7, 0x7, './file0'}]}}, 0x141) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$can_j1939(0x1d, 0x2, 0x7) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r6, &(0x7f0000000240)={0x1d, r8}, 0x18) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000002e00000129bd7000ffdbdf2500000000", @ANYRES32=r8, @ANYBLOB="0100e0ff00000a00ffff060008000b0003000000083481c19dd418000b000102020008000b000bc4000008000b00ff07000008000b000001000008000b008000000008000b00080000000800"], 0x64}, 0x1, 0x0, 0x0, 0x4000000}, 0xa0) sendmsg$nl_route(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@getroute={0x14, 0x1a, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8090}, 0x20000000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:53 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x7ffff000}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:53 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d02b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:53 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80087601, &(0x7f0000000000)={0x1, 0x1}) 11:02:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$CAIFSO_REQ_PARAM(r4, 0x116, 0x80, &(0x7f0000000080)="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", 0xfa) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TCGETA(r5, 0x5405, &(0x7f0000000040)) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:02:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x8010550e, &(0x7f0000000000)={0x1, 0x1}) 11:02:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000040)={0x21, 0x3, 0x0, {0x5}}, 0x21) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r2, 0x1, 0x0) 11:02:54 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d0ab012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x802c550a, &(0x7f0000000000)={0x1, 0x1}) 11:02:54 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x0, 0xf000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:54 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba1390fc35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r4, 0x3, 0x1, 0x86cb, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000040)) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r5, 0x1, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(r7, 0xc058565d, &(0x7f0000000080)={0x1, 0x0, 0x4, 0x20000000, 0x8000, {0x0, 0xea60}, {0x5, 0x2, 0xe1, 0x1, 0x8a, 0x2, "fb31c785"}, 0x2, 0x4, @fd=r2, 0x7, 0x0, r0}) 11:02:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80304d65, &(0x7f0000000000)={0x1, 0x1}) 11:02:54 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae10f56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x8038550a, &(0x7f0000000000)={0x1, 0x1}) 11:02:54 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$can_j1939(0x1d, 0x2, 0x7) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r3, &(0x7f0000000240)={0x1d, r5}, 0x18) r6 = socket$can_j1939(0x1d, 0x2, 0x7) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r6, &(0x7f0000000240)={0x1d, r8}, 0x18) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, @hci={0x1f, 0x3, 0x2}, @nl=@kern={0x10, 0x0, 0x0, 0x20000}, @xdp={0x2c, 0x8, r8, 0x2a}, 0x7, 0x0, 0x0, 0x0, 0xc1, &(0x7f0000000080)='veth0_to_hsr\x00', 0x0, 0x6, 0x7f}) sendmsg$NL80211_CMD_GET_MPATH(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x78, 0x0, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x9}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @local}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0xffffffffffffffff}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_MAC={0xa, 0x6, @random="792a7c239d83"}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000051}, 0x8000) 11:02:55 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x8108551b, &(0x7f0000000000)={0x1, 0x1}) 11:02:55 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x0, 0x0) ioctl$KDENABIO(r1, 0x4b36) lseek(r0, 0x1, 0x0) 11:02:55 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x8138ae83, &(0x7f0000000000)={0x1, 0x1}) 11:02:55 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/ldiscs\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:55 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc0045878, &(0x7f0000000000)={0x1, 0x1}) 11:02:56 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x0, 0x10000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:56 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x20002, 0x1) 11:02:56 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6803890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:56 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc0045878, &(0x7f0000000000)={0x1, 0x1}) 11:02:56 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af5630fde382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:56 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) fallocate(r1, 0x80, 0x7ff, 0xffffffff) lseek(r0, 0x1, 0x0) 11:02:56 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc008ae05, &(0x7f0000000000)={0x1, 0x1}) 11:02:56 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc00c5512, &(0x7f0000000000)={0x1, 0x1}) 11:02:56 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:56 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc0105500, &(0x7f0000000000)={0x1, 0x1}) 11:02:56 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:02:56 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6810890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:57 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x0, 0x7f000000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:57 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2000045d}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:57 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc0105502, &(0x7f0000000000)={0x1, 0x1}) 11:02:57 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) lseek(r0, 0x1, 0x0) 11:02:57 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890339fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:57 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc0105512, &(0x7f0000000000)={0x1, 0x1}) 11:02:57 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/meminfo\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r4, 0xc010640c, &(0x7f0000000000)={0x4}) dup(r4) r5 = dup(r3) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) vmsplice(r5, &(0x7f0000001540)=[{&(0x7f0000000080)="5b411e96c355ab18c87ca193b02e3f58aadf80a801ed6bec39e0b41304df08b87c277b05ee2ecb5d77373b42671059e9a9a3a3973a322b269e", 0x39}, {&(0x7f00000000c0)="2b7a01b89ee5d3a82d486b9860ad24fe0035", 0x12}, {&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001140)="7d78f8ac238a0ff366318a6d3e4b898ef8e8e0a509783f371551d2b9645b8f5c9c67b049378601f1359899b4b5155ea348fb15ee79e773993df6ee589f80816f026e36300ea7cec23f020fae2ad54619fa99d9445e91bcd84c68c09320052b295b725970dc5dbe42809779f7e577f336daafefb0449a1994d3f103d0ece7067ff79bd87494783fa43052bd61ce0b10740c0e708bc1c7854f4593dd638896669c839673f9413c82dd4d4f6823523798c7a3bbbfcccd905137f7edbf00"/199, 0xc7}, {&(0x7f00000015c0)="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", 0x160}, {&(0x7f0000001300)="703cde8a9a6a90b583eded33584ef3548ec5cdf6b5433ed268c034d2ce887243016ad9f778e7867084797be4857c92c385402a8626a83efe5aab992d7540afb5c25fbd206b838bc2e5e9ec551efba155f340d2c025f61ff071c18ead21366b5a5256fbe76d3f36ee02bba411bbb03196", 0x70}, {&(0x7f0000001380)="c3d9d38ff005dcb9c3834aa2c9f22a056d4a34bf3ba141fd988dda55968608808195d8a140c83dd35990ce53a57e2f02e52b775a1565c51a61b3bea6fab4e1525406f4ed68e805f7d0dac692cf9563b8bff1eff16ee8ddccadcb2a79ae7dd4b0d703f700f3a7457583f18ed91b54b1e96be527d68b5941f5a26b81a8bfce3e26b0e1ef4b08978b7a7dc6b745d9680158667b33b92d2918c8b2aa9040da8063a3101408a9db3f11e6d514fd586b94c6da1fc96ea89a62c55d9c8217c0f944f39f71912d9c9bcf27c277fa74f679371f7e21757f47be7fc9ae0863a54e5684849ec03019ad6009ffe386ee625a32", 0xed}, {&(0x7f0000001240)="3a81b817251c9a1d01069213c91994d693606424ade2389554006cf4cbafa835dfc7aac076f785d4549bf7df1b09975b582aac03cb4c154d0b09199c1c1cfd324b1ebb65e9b74c0fcb6de013e782e1b8994bc7faf0885e0657e4900cf563d73489edcd98a927b4d2872212be7f8fd01d40fb09b77ab8d1d8c3d7d937cb53d3450a09dec5559be7f15693de32977b", 0x8e}], 0x8, 0x16) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x8) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000040)={0x8, 0x40}) 11:02:57 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc010640c, &(0x7f0000000000)={0x1, 0x1}) 11:02:57 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000040)) lseek(r0, 0x1, 0x0) 11:02:57 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc0185500, &(0x7f0000000000)={0x1, 0x1}) 11:02:57 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x7fffefce}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:57 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x820c7, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000640)={0x248, 0x14, 0x300, 0x70bd29, 0x25dfdbfe, {0x28, 0x6}, [@INET_DIAG_REQ_BYTECODE={0x158, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x90, 0x1, "2322ee826b47214612099fbd765ea0f5ee87699a3267c1a02c5e57aad94e34785af1baa0783fca02457d37b06547a5ab7041e4e14f8062a7b50fa3cf84944a2e29d74e88f4c4ec9c8ae95bb9b7de0168552224cac3dcae338283cf40b7fccfa721edbef7de72548ae803b2e9ceb036ddb1aebfb6c945aa3f8f1a979674a94f2f867816cffea7986fbc568f55"}, @INET_DIAG_REQ_BYTECODE={0x49, 0x1, "d713ceb818aa941bdf60dc60f576c2ad36193db2132cb2feb4bf39c3275555d0a45a0000000000007ac281bf2ef3f3559ddd4281f8a06003c8d3ba90b8a2053fbb00539164"}]}, 0x248}, 0x1, 0x0, 0x0, 0x40082}, 0x800) pipe(&(0x7f0000000300)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r4, 0x54a3) sendmsg$IPCTNL_MSG_CT_GET(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, 0x1, 0x1, 0x5, 0x0, 0x0, {0x7, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x20000091}, 0x800) lseek(r0, 0x1, 0x0) [ 2074.372476][ T337] usb usb9: usbfs: process 337 (syz-executor.2) did not claim interface 0 before use [ 2074.422717][ T337] vhci_hcd: default hub control req: 8100 v0000 i0000 l0 11:02:58 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x0, 0x7ffff000}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:58 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000200)) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="28000000f703000427bd7000fcdbdf2507000000070000002e2f66696c65302e2f66692c65300000"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x20000001) lseek(r0, 0x1, 0x0) 11:02:58 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000000)={0x1, 0x1}) 11:02:58 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808891039fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:58 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 2074.823255][ T349] usb usb9: usbfs: process 349 (syz-executor.2) did not claim interface 0 before use 11:02:58 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc0189436, &(0x7f0000000000)={0x1, 0x1}) 11:02:58 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc018aa3f, &(0x7f0000000000)={0x1, 0x1}) 11:02:58 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x20000163}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:58 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x8, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:58 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc020660b, &(0x7f0000000000)={0x1, 0x1}) 11:02:58 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc020aa00, &(0x7f0000000000)={0x1, 0x1}) 11:02:59 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc020aa04, &(0x7f0000000000)={0x1, 0x1}) 11:02:59 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x0, 0x8dffffff}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:02:59 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x7fffeff1}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:59 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0xc02c5625, &(0x7f0000000000)={0x1, 0x1}) 11:02:59 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x10, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:02:59 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x0, 0x1}) 11:02:59 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x2, 0x1}) 11:02:59 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x3, 0x1}) 11:02:59 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x5, 0x1}) 11:03:00 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x6, 0x1}) 11:03:00 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0xf, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:00 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f103686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:00 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x8, 0x1}) 11:03:00 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x0, 0xf0ffffff}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:03:00 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0xf00, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:00 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x9, 0x1}) 11:03:00 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e368639108b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_THREAD_EXIT(r3, 0x40046208, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r4, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000040)={0x800, 0x0, 0x2, 0x5b3c}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x0, r5, 0x2, 0x5dd4}) socket$inet6_sctp(0xa, 0x5, 0x84) 11:03:00 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x7f00, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:01 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x10, 0x1}) 11:03:01 executing program 5: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f0000000000)=ANY=[@ANYBLOB="020000001c810000000000000000000000000080430000008dc40000ffa8a362f18f5b56"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfffffffffffeffff) capget(&(0x7f00000001c0)={0x20071026}, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000040)=""/140) 11:03:01 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x1000000, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:01 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1c, 0x1}) 11:03:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x181400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xc) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000000c0)={0x9, 0x9, 0x4, 0xe000, 0x7fff, {0x0, 0x2710}, {0x2, 0x8, 0x4, 0x3, 0x95, 0x6, "39431e86"}, 0x5, 0x3, @planes=&(0x7f0000000080)={0x401, 0x9, @userptr=0x10001, 0x1f0}, 0xdc1, 0x0, r0}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r6 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg$sock(r6, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x40048d0) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="600000000206050000000000000000000100000a050005000c0000000e0003676269746d61703a6970000000340007800500140002000000080013400000bb0c080008af3500004a05526c0905000700730000000600ff40d821000008000640"], 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x20008000) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00'}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:03:01 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0xf000000, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:01 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x0, 0xffffff7f}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:03:01 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x63, 0x1}) 11:03:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4(r2, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80), 0x0, 0xc004) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000100)={0x4, 0x8000}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:03:01 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x7f000000, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:01 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe03c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:01 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c26feff040000004f2740000800000028259f7e9dd28ce8f5b91d2981bb4b9fec39ed9200ecbeb72119d7669f235a8960ca071fc7ad63ad0dccbec8038ad9055ae44678b76ff6eb4d2db023d489f5731fe932a52444ea13c0766c52c97a24ebd362d46a939b534acc28e1ff0f1e39"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x3ff, 0x7}, 0x10, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x1, 0x3, 0x0, 0xa, 0x7, 0x0, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x1e, 0x3b, &(0x7f0000000100)=""/59, 0x41100, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7, 0x200}, 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000180000000000000000000008500000079000000181a0000", @ANYRES32, @ANYBLOB="0000000000000000850000005a00000018180000", @ANYRES32, @ANYBLOB="000000000000000018220000", @ANYRES32, @ANYBLOB="00000000b1fb0000950000000000000018230000", @ANYRES32, @ANYBLOB="000000007f0000009500000000000000950000000000000018270000", @ANYRES32=r3, @ANYBLOB="edffffff140000049500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000340)=""/157, 0x40f00, 0x8, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x2, 0x1, 0x2}, 0x10, r4, r5}, 0x78) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x1, &(0x7f0000000040)=@raw=[@alu={0x3, 0x0, 0x8, 0x7, 0x0, 0x100}], &(0x7f0000000080)='GPL\x00', 0x4, 0xd6, &(0x7f00000000c0)=""/214, 0x41000, 0x1, [], 0x0, 0x1a, r2, 0x8, &(0x7f00000001c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x0, 0x0, 0x2604}, 0x10, r4}, 0x78) pwrite64(r6, &(0x7f00000002c0)="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", 0x1000, 0x3) lseek(r0, 0x1, 0x0) 11:03:01 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x67, 0x1}) 11:03:01 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x3, 0x2) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000080)) fcntl$setlease(r0, 0x400, 0x1) r2 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x0, 0x1c0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000340)=0x1) r3 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(r6, 0xc0205647, &(0x7f0000000280)={0x9c0000, 0x6, 0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000240)={0x9c090c, 0xde, [], @string=&(0x7f0000000200)=0x7}}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r7, 0x4010640d, &(0x7f00000002c0)={0x4}) r8 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$BLKTRACESTART(r8, 0x1274, 0x0) ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) lseek(r0, 0x1, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x3, 0x2, 0xd258b1c8c09955f5, 0x0, 0x0, {0xa, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x2404c000}, 0x4008801) 11:03:01 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x8dffffff, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x4}) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x201881, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) r2 = dup(r1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x600, 0x0) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:03:02 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x77, 0x24a603) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) 11:03:02 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x2) 11:03:02 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x0, 0xffffff8d}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:03:02 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x3, 0x40000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x8042, 0x0) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000080)) 11:03:02 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x2b43c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) sendmsg$NFT_MSG_GETRULE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x7, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000084}, 0x1) 11:03:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000040)={{0xbc9bb8e500c1dacc, 0x3, 0x250f, 0x3, 0x5}, 0x1, 0xffff, 'id1\x00', 'timer0\x00', 0x0, 0x6, 0x0, 0x8, 0x7}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000180)={0x0, 0x7, 0x101, &(0x7f0000000140)=0x9}) 11:03:02 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe10c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:02 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0xf0ffffff, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f00000001c0)={&(0x7f0000000100), &(0x7f00000000c0)=[0x0], &(0x7f00000000c0), &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x1, 0x0, 0x4}) r2 = getpid() capget(&(0x7f0000000080)={0x20080522, r2}, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) 11:03:02 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000080)={0x7, 0x4d, 0x2}, 0x7) 11:03:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000002c0)) capget(&(0x7f00000001c0)={0x20071026, r2}, 0x0) 11:03:02 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0xffffff7f, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:02 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4(r1, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0x1, 0x3, 0x20, 0xd751}, 0xc) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0xfffc, 0x7, 0x9, 0x3ff}, {0x0, 0x2, 0x81}]}, 0x10) 11:03:02 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0xffffff8d, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:03 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1, 0x0, 0x0, 0xfffffff0}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:03:03 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x412203) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) 11:03:03 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0xfffffff0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:03 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x100, 0x80) lseek(r0, 0x1, 0x0) 11:03:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:03:03 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e101b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:03 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r4 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r4, 0x801a}], 0x1, 0x100) dup2(r1, r4) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f00000002c0)) r6 = gettid() kcmp(r5, r6, 0x1, r1, 0xffffffffffffffff) r7 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0xc0940, 0x0) preadv(r7, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/79, 0x4f}, {&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000001c0)=""/250, 0xfa}, {&(0x7f00000002c0)=""/186, 0xba}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000400)=""/245, 0xf5}, {&(0x7f0000000500)=""/11, 0xb}, {&(0x7f0000000540)=""/65, 0x41}], 0x9, 0x66b) 11:03:03 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000000c0)={0x5, 0xa, 0x4, 0x2000000, 0x8, {r1, r2/1000+10000}, {0x3, 0x8, 0x9, 0x5, 0x7f, 0x9, "3ca642ae"}, 0xdeb4, 0x1, @planes=&(0x7f0000000080)={0x7f, 0xf2e, @userptr=0xffffffffffffffff, 0x3f}, 0x1, 0x0, r0}) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000140)="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", 0x1000) lseek(r0, 0x1, 0x0) 11:03:03 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x100000000000000, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kexec_load(0xffff, 0x5, &(0x7f0000000480)=[{&(0x7f0000000200)="1920ca7bb4c1cbf8862c0e682e80dfe7923944c0b984ee4dcb230622ba679ae68715af357785a25a07ac8bdce5fd61af603f9c56012fcc8d7ae13eadc236fff024798df797b7c5c7abc145943e918347f846a4932bd7a098424a3e3a6bac17bf17ebfbe609c438eeeba2bb8b80377dec9075c66a269237e6a4c5abb1ba575d3089b01e8df811a32f9cb04cd0f7920c880b30cd917f6d838ecd56b87d38677fa78d0a9933844d83676c0daa15256ee8627d23bbf1c79fb752d2ec75727ce1b210f7077de3656529728c88a693b012bab26a1cc64ace7e5e3f0438", 0xda, 0x100000001, 0x20}, {&(0x7f0000000100)="a5684a9e4683acb08f39886c4865ac64d952d286525f712fcc274c11404d0e4d005631fa6d237a93603a4fdc8ee8815a4a980c3335aa90e3d0a99ee9e59d982b", 0x40, 0x3, 0x401}, {&(0x7f0000000300)="a2f5f7e37f2b8e2b310dca1e774e1ce52e4c00efd5a7626dea211e3bafda65d91352bb969731f90199fa09ae0cf5e2a1ad65b106806c5b1501d1a1112e32c0debc2bcb0ecc09a9cd393401eae79de70ad7fefaf731af9b652594e0e3356cff0e10743dacc1635f140ff222f160e8b4952a29d6d415cab4b8af3afdc0faea0b327bfbf3837ce204f87e3344f5dea82945040e3b7745b7ae35e3667e5005506a95ea87467d950e0320e490e01211873e9ff456f0d4f10748579b00a7683363e3932751bee3ba826edc464daefafc216bbd9027c3b03dd941b0", 0xd8, 0x8, 0x1000}, {&(0x7f0000000140), 0x0, 0x31a, 0x7}, {&(0x7f0000000400)="14c297c68cef811336ac30e1c8261d194987da462563688e4d9473a1b9fb4b2d5bfa870e43489c1c804b7be129be13a928cf2b50aa470341e8b6649b31d1997ecaffc5b1d9e92c344e6ec57ad1ef7888b7283bd3f6fb88e65147a5b76339c4d756ebb1070b7c9a739d41e8ccb39751df39a4f3e59b55490e6ddacc24", 0x7c, 0x3, 0x2}], 0x320000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x100, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000180)={0x40, 0x7, 0xa, 0x401, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x4804}, 0x20044080) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000000c0)=0x6, 0x4) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000002700)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1024) [ 2080.170280][ T541] usb usb9: usbfs: process 541 (syz-executor.2) did not claim interface 0 before use 11:03:03 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0xf00000000000000, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:03:03 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:03:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') r3 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x25, "0000010000000000080044944eeba71a4976e2529207b18f6e2e2aba000000012e0b3836005404b0e2301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x18, 0x4, 0xc) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8}]}}]}, 0x38}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x34, r2, 0x400, 0x70bd2c, 0x25dfdbff}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x0) r6 = socket$can_j1939(0x1d, 0x2, 0x7) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r6, &(0x7f0000000240)={0x1d, r8, 0x1}, 0x18) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r2, 0x4, 0xf1000, 0x25dfdbfb, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x8801}, 0x90) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r9, 0x1, 0x0) 11:03:03 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x2fe9af34a490703f, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:03 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d1065a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8}]}}]}, 0x38}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r5, &(0x7f0000000240)={0x1d, r7}, 0x18) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_HOP_PENALTY={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000040}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SOUND_MIXER_WRITE_VOLUME(r9, 0xc0044d0f, &(0x7f0000000040)=0x4) 11:03:04 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x3f7090a434afe92f, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:04 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000200)=@urb_type_iso={0x0, {0x3e}, 0x7, 0x41, &(0x7f00000006c0)="bd585be3203592b99971669facefba65606aa742b7ecc412f82004492973f810c04affcbb96ab0403869578019dacb59358ab9bfca8b09d808124aec3cfa640fe81b2d563ac38b2b196634030078b0935725bb2da37f35d537c6f073c0344d002323658e812aabb86e5f73b739028d2331b910a2ce60bcfe75953112dc775bb0b3dbfaa75b6f7f06f87da6f4085d0212aba393621035da546ebfa374e099484179af5d07917e7586bdb6646f44e6773c95cf680d0f16afe1dfdb08a5fd78cf54cb828620c03141442a1651153aa8bc8d43863b62cde3a94bd9d51ab2daf813f3", 0xe0, 0xa0b, 0x0, 0x5c, 0x401, 0x2, &(0x7f00000001c0)="7349273dae0af5028f17cdd1984d3f41afd77429da045bae1f02c80dc98667f0", [{0x89e, 0xbeb, 0x100}, {0x1, 0x5, 0x90}, {0x2, 0x7, 0x2}, {0x1ff, 0xffffbf21, 0xfffff0d1}, {0x101, 0x7, 0x3}, {0x401, 0x5, 0x20}, {0x4, 0x8, 0x1}, {0x6, 0x9, 0xffff}, {0x8, 0x7, 0x8b4}, {0xf47, 0x91, 0x200}, {0x2, 0x1, 0x9f1}, {0x4, 0xbe93, 0x6}, {0x9, 0x9, 0x3}, {0x4}, {0x5, 0xa9, 0x4}, {0x20, 0x1000, 0x7}, {0xeca1, 0x800, 0xfff}, {0x0, 0x8, 0x1f}, {0x4, 0x400, 0x9}, {0x5, 0x400, 0xb4}, {0x8000, 0x4, 0x7}, {0x1, 0x8, 0x1}, {0xffff, 0x2}, {0x1000, 0x5, 0x80000000}, {0x1ff, 0x10001, 0x2}, {0xfff, 0x7, 0xb969}, {0x3, 0x80, 0x3f}, {0x2, 0xffffffff, 0x8}, {0x7fff, 0x6, 0x10000}, {0x2, 0x7fffffff, 0x476}, {0x7f, 0x100, 0x1}, {0x100, 0x101, 0x7fff}, {0x9, 0x1ff, 0x2}, {0x5, 0xdc2b, 0x3}, {0xc55, 0x9, 0xaea}, {0x7, 0xa6, 0x6}, {0x377, 0x6, 0xf60f}, {0x8, 0x7ff, 0x6}, {0xb8, 0x24000000, 0xbb}, {0xd2, 0xad79, 0x4}, {0x8, 0x4, 0x71610c55}, {0xde0, 0x8, 0x5}, {0x1f, 0x8, 0x9}, {0x5, 0x8e1, 0x34000000}, {0x7f, 0x401, 0x7}, {0x7ff, 0x8001, 0x9}, {0x5, 0x2, 0x1}, {0x31, 0x9, 0xfffffeff}, {0x6, 0xfffff801, 0x7}, {0x0, 0x48e3, 0x6}, {0xf46, 0x1f, 0x1}, {0x23a0, 0x8, 0xff}, {0x80000000, 0x8000, 0xc122}, {0xfff, 0x200, 0xfffffff8}, {0x101, 0x2, 0xd5}, {0xaf2, 0x0, 0x7ff}, {0x1f, 0x5, 0x1ff}, {0x8, 0x6, 0xff}, {0xfff, 0x1, 0x5576}, {0xfffff8cf, 0x7, 0x7}, {0x7436d8c8, 0x6, 0x4}, {0x6, 0x3, 0xb13}, {0x7ff, 0x4, 0x31}, {0x1, 0x8, 0x7fffffff}, {0x81, 0x40, 0x3}, {0x1, 0xffffff43, 0x7}, {0x2, 0x3000, 0x10000}, {0x8001, 0x7ff, 0x9}, {0xc0b, 0x8, 0xff}, {0x8, 0x2, 0x1a}, {0xfff, 0x6, 0x4}, {0x3, 0x3, 0x2}, {0x6, 0x6, 0x80}, {0x2, 0x0, 0x1}, {0x5, 0x9, 0x7fff}, {0x1, 0x5f, 0x1ff}, {0x5, 0x9, 0x80000000}, {0x3ff, 0x40, 0xffff8000}, {0xfffffa0f, 0x9, 0x6a}, {0xfffffffe, 0x0, 0x8}, {0x19, 0x3, 0x6}, {0x7fff, 0x1, 0x8950}, {0x92d1, 0x4, 0x2}, {0x400, 0x5, 0x3f}, {0x8db, 0x3, 0xffff}, {0x3, 0x9, 0x800}, {0x475, 0x0, 0x401}, {0x6, 0x6, 0x1ff}, {0x9, 0x674, 0x8}, {0x8, 0x1ff, 0x1}, {0x6, 0x1ff, 0x9}, {0x40, 0x9, 0x2}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RLCREATE(r4, &(0x7f0000000040)={0x18, 0xf, 0x1, {{0x1, 0x1}, 0xb08}}, 0x18) 11:03:04 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x7f00000000000000, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:04 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4}) fstatfs(r2, &(0x7f00000000c0)=""/220) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:03:04 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x4}) lseek(r0, 0x5, 0x0) 11:03:04 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a822100b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:04 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x38, 0x2, 0x7, 0x101, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x8}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x30}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x81}]}, 0x38}, 0x1, 0x0, 0x0, 0x4004}, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0xf0, 0x1, 0x6, 0x40, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e21, 0xfffffffc, @local, 0x40}}}, 0x84) [ 2080.987240][ T588] usb usb9: usbfs: process 588 (syz-executor.2) did not claim interface 0 before use [ 2081.125409][ T590] usb usb9: usbfs: process 590 (syz-executor.2) did not claim interface 0 before use 11:03:04 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0xf}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:03:04 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x8dffffff00000000, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCGUNIT(r3, 0x80047456, &(0x7f0000000080)) 11:03:04 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x62, 0x2, 0xb6, "d4d1bdca3815494d366f736a9cbf39d2", "c4304eac741c4133613058e9875729b5d42172038a4a8e0d8a701f6cd6cbba4c0ded8712f723b321f49f26061fe915dbff15865f7948207ce407da1a261dccc487f34d61c26f7b28e998a5b815"}, 0x62, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SVE_GET_VL(0x33, 0x1a61c) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000040)={0xffffffff, 0xfffffe01, 0x20, 0x56b, 0x0, 0x1000}) lseek(r0, 0x1, 0x0) fanotify_init(0x40, 0x0) 11:03:04 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x14, r6, 0x1707}, 0x14}}, 0x0) sendmsg$TIPC_NL_PUBL_GET(r4, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)={0xe4, r6, 0x410, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x38, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}]}, @TIPC_NLA_NET={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}]}, @TIPC_NLA_MEDIA={0x50, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4008010}, 0x4) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000001c0)}}, 0x10) 11:03:04 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0xf0ffffff00000000, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:04 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x414c00, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x20, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_SCAN_SUPP_RATES={0xc, 0x11d, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x8, 0x0, "b9e9703b"}]}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_SET_KEY(r1, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000005c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="62334791bc70bff57328006da0ce61d6000000"], 0x18}, 0x1, 0x0, 0x0, 0x4004}, 0x1041) 11:03:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000040)={0x1, 0xfffffffb}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:03:04 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0xffffff7f00000000, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:04 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e10301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 2081.562005][ T611] usb usb9: usbfs: process 611 (syz-executor.2) did not claim interface 0 before use [ 2081.586428][ T610] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 11:03:05 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/fib_trie\x00') ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000080)) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) [ 2081.634635][ T610] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 11:03:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$apparmor_current(r3, &(0x7f0000000040)=@profile={'permprofile ', '.\x00'}, 0xe) capget(&(0x7f00000001c0)={0x20071026}, 0x0) [ 2081.955598][ T625] usb usb9: usbfs: process 625 (syz-executor.2) did not claim interface 0 before use [ 2082.006815][ T625] usb usb9: usbfs: process 625 (syz-executor.2) did not claim interface 0 before use 11:03:05 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x10}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:03:05 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 11:03:05 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="02002cbd70000800df251208000008002c80efc6f8db1b4a960006000000"], 0x24}, 0x1, 0x0, 0x0, 0xc025}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xab}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x20}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x4c}}, 0x60044) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="20000000020901030000000000000000020000020c0004800800014000004e92786648de7348150bd6826f0c5b3645c2c6d2e8388f58fafd9c0ead79be71bc565c53269ab2475af6563b73d43d07809b070100fecee53346ce708e9e6f4cc442c15476e28e921a9d2607fae874ddd23af52b8ef5832eac0cfc04e48a9735e20337f029da41dc591948e8e6eb32b15c16a6d21164728ba9150d13a59bad6f8c9d5cea51b3c2cc26bcbe0ae738b0b137395c8c6c4c252478c129f42172f5dc0ff8a5bd53bb54ebcb1e44f4ea0d38e36bc0120db062f0e6b6213a91e01b772a000000000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x84}, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000002c0)) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f00000002c0)) r5 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r5, 0xc010640c, &(0x7f0000000000)={0x4}) r6 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r6, 0xc010640c, &(0x7f0000000000)={0x4}) kcmp(r3, r4, 0x2, r5, r6) lseek(r2, 0x1, 0x4) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000080)=""/8, &(0x7f0000000280)=0x8) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) 11:03:05 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d02a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000001c0)={'ipvlan0\x00', 0x9}) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r1, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x0, 0x0, 0xfffffec5}}], 0x1, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x2710}) r2 = getpid() bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x1c, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) sched_setscheduler(r2, 0x5, &(0x7f00000002c0)) clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x68280, 0x0) exit(0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x40, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='status\x00') preadv(r3, &(0x7f00000017c0), 0x1b4, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f0000000040)={0xf6, 0x1, "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"}) 11:03:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fe) capget(&(0x7f00000001c0)={0x20071026}, 0x0) [ 2082.210787][ T644] usb usb9: usbfs: process 644 (syz-executor.2) did not claim interface 0 before use 11:03:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c0000000f14020029c4c05d9a112ccd1a4dd51de1d54a5cd75f26faba00010001000000080001000200000008000300020000000800e99f85181c26c660740000000008000800"/88], 0x4c}}, 0x2040085) 11:03:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x10, 0x70bd2a, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x4008080}, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:03:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f0000000080)={0x0, {0x3ff, 0x7}}) 11:03:06 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}, 0xf}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:06 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d08a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:06 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0xf00}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:03:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYRESOCT=r0, @ANYRES64, @ANYRES64, @ANYRES64], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8004) capget(&(0x7f00000001c0)={0x20071026}, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x3, @local, 0x243}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r3, r4, 0x0, 0x8607) r5 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r5, 0xc010640c, &(0x7f0000000000)={0x4}) dup(r4) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r6, 0x84, 0x23, &(0x7f00000002c0)={r7}, 0x8) syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000000c0)={r7, @in6={{0xa, 0x4e22, 0x0, @mcast2}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r7, 0x5, 0x3, 0xff8c, 0x4, 0x8}, 0x14) 11:03:06 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}, 0xf00}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:06 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d10a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:06 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) lseek(r0, 0x1, 0x0) 11:03:06 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x9, 0x131502) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) 11:03:06 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x2) 11:03:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x22, 0xa, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xe8, r3, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x56}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1000}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xe5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xff}]}, @TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x86}]}, @TIPC_NLA_BEARER={0x30, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @private=0xa010102}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}}}}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x20040840}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f0000000040)="d59dc065d86e185feb172323e97d51c87e2a35e8ca3af8f7cc84798c88769bb671bb0816cf7b2b8af6b3cdd9a657e6a5dfa612d289f265e3b7ddfa993b2de2c8f8f271db2ded4b96d74661f0d621fb39f1c397cd9fa8674c32b0a7231160d5835aeefcc5ca3b3b63564c5bbb217b242fc8aa3eabcf0e974e6af30a75bc2db352ec2086743579bc43fc4c9911fc211c892cf0ea1cb05b34eaacc0214f09cb627ccaafb5884a424596c2db7eea3ac5fb7f35809f13d32ea5e4f2f7c3a1d2977d309c2df4ae5101e4afbb4dfef61c0b14c7f12922a3b0ba47da1430c3783a7eeddff4e3e9c148dabe9f72388bcfbd", 0xed, 0x10, &(0x7f0000000140)={0xa, 0x4e24, 0x2, @private1, 0x5}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:03:06 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) 11:03:07 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) [ 2083.647574][ T694] usb usb9: usbfs: process 694 (syz-executor.2) did not claim interface 0 before use 11:03:07 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:03:07 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(r4, 0xc058565d, &(0x7f0000000200)={0x7, 0x6, 0x4, 0x800, 0x40, {}, {0x2, 0x2, 0x7f, 0x1, 0x1, 0x1, "3612625a"}, 0x2, 0x4, @offset=0x6, 0x3ff, 0x0, 0xffffffffffffffff}) sendmsg$NFT_MSG_GETRULE(r5, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x100, 0x7, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_RULE_COMPAT={0x34, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_RULE_COMPAT_FLAGS={0x8}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x8906}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x87}, @NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}]}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x4}, @NFTA_RULE_EXPRESSIONS={0xa4, 0x4, 0x0, 0x1, [{0x74, 0x1, 0x0, 0x1, [@rt={{0x7, 0x1, 'rt\x00'}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x11}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x9}]}}, @dup_ipv4={{0x8, 0x1, 'dup\x00'}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x16}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xe}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x17}]}}]}, {0x2c, 0x1, 0x0, 0x1, [@tproxy={{0xb, 0x1, 'tproxy\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x10}]}}]}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x8000}, 0x34040880) [ 2083.871376][ T708] usb usb9: usbfs: process 708 (syz-executor.2) did not claim interface 0 before use 11:03:07 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x7f00}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:03:07 executing program 4: socket$inet6_dccp(0xa, 0x6, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000540)={0x198, 0x11, &(0x7f0000000140)}) lseek(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x88082) ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000640)={0x9b0000, 0x6, 0xfffffff8, r3, 0x0, &(0x7f0000000600)={0x9a090b, 0x8, [], @p_u8=&(0x7f00000005c0)=0x9}}) r4 = dup(r1) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, 0x0, &(0x7f0000000100)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000040)={0x7, 0xfffffeff, 0x6, 0x1, 0x8, 0x8}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000580)={0x7, 0x33, 0x2}, 0x7) 11:03:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) getrandom(&(0x7f0000000080)=""/21, 0x15, 0x2) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000040)={0x1ff, 0x1, 0x3, 0x7f, 0x6, 0x100, 0x6}) 11:03:07 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}, 0x7f00}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:07 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d02b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:07 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000040)={0xc8, {0x0, 0xfffffffc, 0x1, 0x8001, 0x1, 0x37}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x17) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) socket$inet_dccp(0x2, 0x6, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4(r4, 0x0, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x80400) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$SIOCPNGETOBJECT(r5, 0x89e0, &(0x7f0000000080)=0x7) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x5) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) 11:03:07 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x2040, 0x0) fdatasync(r1) lseek(r0, 0x1, 0x0) [ 2084.318110][ T722] usb usb9: usbfs: process 722 (syz-executor.2) did not claim interface 0 before use 11:03:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) getsockopt$inet_udp_int(r3, 0x11, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) 11:03:07 executing program 2: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_RESETEP(r3, 0x80045503, &(0x7f0000000000)={0x1}) 11:03:07 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FBIOGET_VSCREENINFO(r3, 0x4600, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capget(&(0x7f00000001c0)={0x20071026}, 0x0) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, &(0x7f0000000040)) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001380)='/dev/vsock\x00', 0x100, 0x0) ioctl$PPPIOCGL2TPSTATS(r6, 0x80487436, &(0x7f0000000280)="020c744b190c8e62834490657958c36cf7f3b0c4d096efaaa4b55334cab1891dd4887f1146229414d6972a0302f8fbc3fa16983f4c5396ae9f4aa119de87f4e3d9d5ea350af4da64f7251a7e95c25be6668f474916ea10d5f16380155028fae537e399f4fce3be4b4546116e4163ff9899ec07bf63bcb927bb0d6b9cea7c07522adbe63c7d13e9f6fb6acee5b56f3c6a5ec2eee99b9de6f13535a2405d73b29ff8841486f2bc66666b10c353a0f52c4f209f0c4d4ec98928975a259ceaa7ae57fa35904947b70be42195c67166ae54705479b1d881fea715a17c6cc663bfab7848e7ef7b8138d5635a383ab75bd59340302ab7207e15eba8493aeed73aef3a9b176df7aea6704ba78ad93de9148b5d7765e870888f07") [ 2084.565460][ T733] Unknown ioctl -2142735306 11:03:08 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f00000001c0)={0xffff0001, 0xd601, 0x400}) ioctl$USBDEVFS_REAPURB(r0, 0x4008550c, &(0x7f0000000040)) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x7fffffff, 0x4, 0x4, 0x2, 0xfffffff9, {0x77359400}, {0x1, 0x1, 0x2, 0x81, 0x3f, 0x8, "8bd67a3e"}, 0x1f, 0x4, @userptr=0x1, 0x4, 0x0, 0xffffffffffffffff}) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f0000000100)) [ 2084.606542][ T734] Unknown ioctl -2142735306 11:03:08 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000240), 0x18) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) r2 = socket$can_j1939(0x1d, 0x2, 0x7) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r2, &(0x7f0000000240)={0x1d, r4}, 0x18) r5 = socket$can_j1939(0x1d, 0x2, 0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r5, &(0x7f0000000240)={0x1d, r7}, 0x18) r8 = socket$can_j1939(0x1d, 0x2, 0x7) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r8, &(0x7f0000000240)={0x1d, r10}, 0x18) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000740)={&(0x7f00000005c0)={0x160, 0x0, 0x10, 0x70bd29, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x3}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x4}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x4}, @ETHTOOL_A_LINKINFO_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x6}]}, 0x160}, 0x1, 0x0, 0x0, 0x800}, 0x20000805) lseek(r0, 0x1, 0x0) [ 2084.721001][ T739] usb usb9: usbfs: process 739 (syz-executor.2) did not claim interface 0 before use 11:03:08 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0xf0ff7f}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:03:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x9) r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x80800) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4}) open_by_handle_at(r2, &(0x7f0000000100)={0x61, 0x9, "63c0f166a5fbda58023b5c629453a6232e8d2c28e1c155ebe2ad5fcee4040642908db57850aa6c2e065b4f273dafae2246720ffa9e8c058f786df77787c1ef0815967f66bb042b549af13119aea43fbf327d36741342176d55"}, 0x22080) capget(&(0x7f00000001c0)={0x20071026}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$pptp(0x18, 0x1, 0x2) ioctl$KVM_CREATE_DEVICE(r4, 0xc00caee0, &(0x7f0000000000)={0x4}) 11:03:08 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x4}) lseek(r0, 0x4, 0x4) 11:03:08 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d0ab012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:08 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}, 0x1000000}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:08 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8}]}}]}, 0x38}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r2, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x0) r6 = socket$can_j1939(0x1d, 0x2, 0x7) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$can_j1939(r6, &(0x7f0000000240)={0x1d, r8}, 0x18) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x6c, r2, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x3}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="17f7d01c791d"}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="16ca037f639c"}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4}, 0x10) 11:03:08 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000040)="58ac223ac9f9d340480523198164e566fe600a39aa79b2589b0fac08b5986409feacde5291210edbb0177843acac81d63067d5ba4658354eba64449c059ea438f9121b45d355649010d9435693755b00fb9fcfeb81c247", 0x57}, {&(0x7f00000000c0)="0d5714d8949d927f8cbacc1d8d008c541b070f09b576d876068daabd117bc68c306d3c2075838317a79ba47cdda992cc51ffa22f737a963b9a57647f3edacd7db27be6cc92c97ab3b5c66c452edf1252ed38c83d4bd35be094e8f585c703fe5090cc49a4", 0x64}, {&(0x7f00000001c0)="104837bfbe97107a8eff28566c59421d35a53bb31bce3e0eec6c857d09c3e7f6e2808ba4f67dc4faa1142e2dcc159a0cd4abfe86567cc072f1ff79a4e14f2b829c16b839922d2c49eddd0c3771528f876efa55c1497cbd8edb90ce5fcae03d32b233c3dc1272fd9cd0d7e9d4459201450bc0f66c56848d396d76c0069904f5060c8d3c96fc0d76d442db8b92f39358de1e65fb291a5b1e79659f4fc5ddcda1ca7b832ca0fe05da732129b9f64d7f10d04d1bd564074c34f858b5d3759a63b1cdf80033d6d9ba10c486809ce81e3381534b4d26c3ad6bca1918d8e8a4200768352ad88ec7ab981274e00adcb92382571cae2492fa83a681190ac1184101a496f6e02e2b9b88c50df8761aeeb0bedf3fcc747a834f1d7f86f7384fdcff58e446a54b92195dd0b739d0651b1834edd9b42e87e1fd4f8a86f9bbeff0f5c2546ba3f4c2a310ad7dfd02c6200eb09c914ac6bdb440516da32d122867ed3cfe9791653ea6a6288bbc7368b75f8fde0bd2b70fb4d1ccb201021eb1097c8422d02f9ada8a29e9145281279c1638aa9a08f62dd84e159a371f9c7d410041f810f4894aec0401592ff4fc5aa4239c7f21b4aa44cc01d4b52da55256a1ea202ade515a577ebdaea0adf672e2fd4b709c6280f6709419a2b3468b0b2874740823863a8d562c936f91217b273d7ca45c6e6b5eff21020805165a500f0c327682371fb44ec014d7a869f1af888433d63412d021f7787d0dfd6dd9e9ac038c9a29e4570f2542625673101f002dc711534938f10b72d27a813fa2f7989bab85b683e102e4c7b75367e34e4e437e69994ba828b8330d28c68489ab99957481fc5256ed5755e1a388d706ecff0f04b4a7a1289043a957daaf9ae4e15a4359fa825424e40ce7cebaadf1355d71a87fc619531dabb1efe5c9a7ae3527706acf41998e15b14f7c5821b07464cdd3c94cc8c72ede4e30814719d15aff561a7870b9e980b36bdeec94e7767e359891401750f371c10afe24e45c9c8a7da40d047aff1c6ac231a2fb84ec77a0a6df49439982fcb75093b679cee5354bf96aba3cd746b7e244ab34482ba1ec7d8b31b65956e98054a03b2e6c345e9062f27dcdf8fcbd7c8b8b08876b85a945750d3044b3a3bcc7121bc5cc7543a796aea499d4cc6bf7e02a2b31dc1212da08a45acd6aa231ae1f65c15f9a25671fd3028c7648d2e9ff83a30cc06abad7a31fa7b2b446215b8179736d459d1634206ffc51893c1d8e8babe0f0048f9b8d9d7ffa2cfe3f2afb92cbe8703d18fac083e834d233acfb2f78810843136d055a88be6a5245d5ed68d208ba9cc54ee0c71edf65b5b53a77f75ff12e1c1a4cc813ac58780127e1d6ecd871490f9277b1a3a39c484ae799935fc95970f5e3da2ebebee6c67392f78f2b161554155d3a99295d3a8c3adefee6c0db833eaf608840c3baea36a4285eb6967b695361665fdf8cf7a3c033b9d609aff7d3a07e7e8d88c3b21b3f02a07340dbf909ed27ed887edc19c2e82854bb50db1731d036a1005acc703a053fc615fb0ae89c3d999790dc3414e30dbbb51e79ae6425a19de014e8e57cf67b6b7d25d1561cd6b8b6dde2623354b01c148c9df225e71ba257c455c3589777e20d718969e4a0def518e20f026e071fbf9d2396dbd580494fc97222dfb114ebcc8220762a65c8c32a31fc467a2e200d4715ebda496e64245fa7f31b30834ff5e552b4c43e2b9e0119bf5fc3a4a2c2473c5a5b6b3bd06f2d962d1c79466b5195d2a5bc90195a781c771ba6d3bff8666d1bede3fcc7d0c5a42b0564d992bbdad19e590ea74baf8809618ce0e2cf599514e98cbfa1cf7080fc1dbf4052f4c70376d858c4f9ee59a36994ab7ca371e4603c99e310a4ee40f764cb1fcae90d6a53ba69c7729755d2d7cf8163ed1ace3f01bc3470fa02ed41c1cae1e9cde0bb7d20926e3f710e75632eb8c5dccb4c484776dee9f93976228ed3a762c03d48680b79cabe4c593f41afecfa36672439986aef451b7ce23df561c5ca0a27f5f422dd76ac7a8c07c6c889f5e60aae64978aff84167742cbf35f2ae96cd0eb9bb71e1e4dc7c0fc5c0d36cbe8d792a445095050f24c476f8ed253cad77ff21e4ffb514222bc733a998567ce9c589ed346173ac95485680552b7bf91dc81608b89ac2d48b6d0bf60c2d06599d98041f15444a0b09b3f865394869faba0b7267cd9a8f57cb10d16116e958ea8e2c90caf36f1f698634cc1bff25858b7b3135e7885ab622fcb26b02bdb9fd005564b79285963136aa4dff447c658583056167ee2ec2dde882938615dceb19969ab152b4748ac6db320e0c528167bbe6c36cf3644695410fb63b5e1896d79511b98c1cf5049bb2481ce61f21208a91a59e1bd30d8687e0608a5f584e191dd47ddfd0263a1b7d12937c084672fab81742caf9684eac34d7d06f50082f5689d497c00a122adcefeea72cf6adc4c994f321de78a2f56f90962e7c8d45ab8f9f7b6f4a8cd97d42e51695861e15a97d1745ae817eb2110f626c94eb42008887b7c1d885507b25dd103db4d55fde6ab3b0c3fc9be3828340c84c7f0a680913b18d3b23dadba7685407d4bb7c3ee67717da966fed678f728297c5d472d35f27d4f0cb2d1d42a2e054b45a3c89de6149328a27095aa8150de02eb1fed3c423903ef1107e03ab8a25ec4bb87739d13c420fe9e211965c9d46c993d73702af8398a2204d461d5cb7bb2e7db397137fc99f12e5bb9487f63e0993a5726783b382865aa5d7cf22863201df336be07c4da657ee37f1f09a7deeb3181734e49c92fc3d93d20e5a3e4747350370b94f4e5defabb6c8a2c1c24636260f6360a633c8eb6368bdbfe1f171ef253909274512de3503cf6ee587bbeb3f48cc9502fe005dc6e625d99fe4fce229a86a880254d652c62d47cdba706f426f24e14f022281515fa42b971d827a150dd6d3d5dd5b93ceef01f0d6b9d89bc9fd8c68191bf6d74362800f6e4770256744c3e406346b1cd953b44340f9e8f5234b5b7b2798e59995d46d7648d3c4916eb72a522a39cba2dc396cd898ebda89860347c07ba373980b32433b58d4704e371790a5d90d5d7bdebb72ce27bbc88743444015e490b0498e8287490fe610f93f98c39fd4dc2ca58307feebd038ed308a7460d4bd1bfe83f2537342f7de8cb1ed32634deee276e2a8f57d955fc8d1c731ab9dda54807f8aac7686835bda6c4ddf3b3ac1c1bb8d8c42fa1bfdfa634e0dc47f65ad2969b1a46b1c5e21a3ecc567e2254ab5ef287f0646d0c19e4d2c6aee6530d5dd326871b4ee722cb72c557a8a717d4c04cff62f193f2629491ec8fbfb2d1a6d7779f449d8e96a7e917c460465754740618ebea214ececefa7551cc8fee7884426509b2fad2d61eb7c15297f496059287bb8dc6e4577f0982e3a457fa813e1f7e29ea93423abeffaea03ccc6a620fe674f95272fa27e725a1dd1b8b1d7ddb9aa287bbd7030daf680739954c90b2a3398f460111a8ebac7c511700940b91e4d78f251c3bff0c91346f00c5e4c98bab050ac8d2445dfb044635d251964e95f23fc071515f5167631979de2a5d62e7eecda0b8deba3ff543b996c3ef052628bd8ded044294f410ed944b1d5c995c43fd65e991909e60f4ac30a9623a4874346953d61fac3c511f28474a3ac976ab225aa34569681b6cfa49a38e559ee27c0b0a78cbf756639f7f4928ee6f900ba6dea5243769ebf17281dfd29ed86f401ff94be13e5747cbeffdbd302c9474a19bb288fe2dc38b57172735aa9a9369588c1a8954a777ddb6dcfa51c1c2f4bbcbf94a5eac5cdcfea3cf312bde0c1a3ec5890a3bd56706b9c0e63150e81b86551ee192c91adb06cd6da59849f49d17d7259fc5685beb08d55aaa053184e0df534aaaf60389fa32c1d668c2a35fbefdbd6d7c29bf280dc5000bc5112038fbc31a567ac00ffd9d5047291d3d1f90fcf49ab2d1972bef2be9c3e352271eb8499425fe981fb5f78b3ac60cec2490dc524fab30a203890ab0bb5078dd862be060264a0566475a9e32c5461b66e077029c46c7e5e9c5db37488e7061c53463b1d84bfb62bf6fbeb694e6af2f28cf21080894a370e8eed5fff7cd0505382347c1eddca5c5be414ef73f30df37305c09d714fe5a2287eec0e5d2544aa6a6fe49001c60eb1100a4ef4aa1a6dacf49ce5ce553ae837b7dcaf13623fc219c3266d815f6d17a841cdd7e42ed53f0da0eb5004a5e6d52e50c59170c7fe4b8c83f7bb700b6efaecbbba457f01679cfb9b22a0eb46785364dcbe81682b2e4c5041127c15100faca28d08b1034215f37fb32ad36c215174e38d3565bb18558284a37cda626c992412a6574d0bb362dfb6cceffa36fd04a2930907df7441ca776c5197e59ffdc173374bb4e0994d38200ae74e2cc61b3b2bd999b59861a1084259883cafaf1e0c6a32acdd7937cf02748af5609edf975c751218b7dfdabbad77aa34015636c26642e00b4e653be91886b65fae454f023272419fa28952516ec6d305759a45311de750545e192064f3a6fb6a1efa1d856bb42671d0a1cba41f80a7a4f92f64a55e3ba295922ef289f0fed931d113976ee6511997d68bfbd99351ee0d8cce62cdfd20eed97945744cf0b3bd0ef742551931f483be645f9fe68f42facb303ecd1a823502f972a94735eb18895353d06ce6c3ec053320b61783adb1f1e2d839551486a362fca9c7036b853c5cde380c2433da1b7e0efcdcfbcc40b87a6720083844e2395d3279306f177de7edf88bcdd17fd9a85b09e7b761759d48ec5bf941ac824cd083859aa57246b57ad43d5a25af6e57a7975c1f9c7bf65b40b9bd774c2378e9ac6ea41407588e681e367c8d0f2b6bcd195d0043df1047ae20149eb25c4b5176e2d8b6155c6c7ea5d08d311ce5b4099d9c35ecb2119db94c09c34ea04a07a24511e01d6dcc0b1a0f1273249709bfedff854a3182e22e6f5a41526b664d32653932bd0dbcc5ffeee796d4f3ce1a3fb2b3af495dc587a2a9819b2e1cf397442b27f3148e0d58f9aa542c3787a10e93f7f2b9fcefa8961b86f7f4dbafb0e52fc9fe7c3dd31b14e4ecb2ab52ed32dcef3be9a4f4289e1a8f01a711b05489b817833ec6c738546bee63594c43ad081b4eb09857161bb3d15b9d53ce290064a0ede12c7c3553cafaf977790cfc172f55630df7205db8eb45cdc7c93a2e5107bc9248927a4deea92b4fdec6120da9b7ae39282b7cb5667388592305d46fde521d0cfcdef46501e0ed2c5877a90752cb7867867d408c8e4e870d64b10f58b9d0bc03b073d0491365f9d0a02dd6ff23ed8fe15417573a97fd4877b881b946748adddc2630df9088a6bedb46e610a0f0a0b55f64d78ad25f871f176eb5baac5a8e135b5d9a0403a776e5eca6508d053d17111cafdf4e64e52fc8fd192afbc130b715b3e233a55f9f1e9b101c75d126bcc35854062b1814145f06ee884ea0a8dfbba59adc6cd88e7d7e12678fb56410a796eed15987c2853b87e4526da6541783ebc525d0f5ab5098c4fb0736a5dd218cd0c187b1cd21bf6619d27e97297affc4407479e9a15a2d078feea142f42608666d2bf07c5400794acb94f7908740893db1fff32b5178af2e96e29fc70af3ccfbac339ce69539fe5cb94252b99153f4f0a477faa456f0d61733c0cdb2ef953cb2df802a6b680b2c58afd1e03be0e794766000f8cb0075fb5eaf45c6efc6c825d383a639994f8defe467b7067966fabf534cfc06c657b040e7bbf39dcd3f32ebb940421cf8e9dff0c5b9049f38a013cbb5771eb35", 0x1000}], 0x3) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001280)='/proc/capi/capi20\x00', 0x80, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f00000012c0)={0x0, 0x0, [0x4, 0xb0, 0xc3, 0xffffffffffffffc1]}) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f00000011c0)=0x3, 0x4) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000001200)={0x3}, 0x4) syz_open_dev$sndmidi(&(0x7f0000001240)='/dev/snd/midiC#D#\x00', 0x0, 0x2000) [ 2085.658218][ T773] usb usb9: usbfs: process 773 (syz-executor.2) did not claim interface 0 before use 11:03:09 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae10f56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:09 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}, 0xf000000}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:09 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000040)) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="500043bd7000fcdbdf25010000000800024505aab100"], 0x1e}, 0x1, 0x0, 0x0, 0x4008041}, 0x4040000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r4 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r4, 0xc010640c, &(0x7f0000000000)={0x4}) r5 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r5, 0xc010640c, &(0x7f0000000000)={0x4}) r6 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r6, 0xc010640c, &(0x7f0000000000)={0x4}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001280)={&(0x7f00000012c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x3, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @union={0x10, 0x9, 0x0, 0x5, 0x1, 0x80000000, [{0x7, 0x2, 0xdfd}, {0xd, 0x3, 0x1f}, {0x1, 0x3, 0xfffffff8}, {0x6, 0x0, 0x200}, {0x3, 0x5, 0x6}, {0x9, 0x1, 0x3}, {0xb, 0x0, 0xfffffff9}, {0x1, 0x0, 0x6}, {0xc, 0x1, 0x2}]}, @ptr={0xb, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x1e]}}, &(0x7f0000000280)=""/4096, 0xab, 0x1000, 0x1}, 0x20) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x3f, 0x0) r7 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$IOC_PR_REGISTER(r7, 0x401870c8, &(0x7f00000001c0)={0x4, 0x1, 0x1}) lseek(r0, 0x40000001, 0x0) [ 2085.967847][ T781] usb usb9: usbfs: process 781 (syz-executor.2) did not claim interface 0 before use 11:03:09 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cgroups\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) 11:03:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0xf) r5 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="465575e739378248af1d3b", @ANYRES16=r5, @ANYBLOB="00012cbdfcffffffffffffffdf250500000008000100000000000c0004000163ffff"], 0x28}, 0x1, 0x0, 0x0, 0x24000000}, 0x16) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000400)={0x3c, r5, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$NBD_CMD_CONNECT(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c00ebff", @ANYRES16=r5, @ANYBLOB="200025bd7000ffdbdf25010000000c00020008000000000000000c000500d19af5a453aa5dc7"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x9}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r6, 0x400, 0x70bd26, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4048004) capget(&(0x7f00000001c0)={0x20071026}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) 11:03:10 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x1000000}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:03:10 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) syz_open_dev$usbfs(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x4, 0x20800) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000080)={0x3, "c4e31e248acb71eb19c1bb08037d7bd082ee61c82c2e5f60d73abff5713f93f7", 0x2, 0x0, 0xe1e, 0x6f, 0x0, 0x2, 0x5, 0x1}) 11:03:10 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x2) 11:03:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$NBD_SET_SOCK(r1, 0xab00, r3) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f00000002c0)) write$P9_RGETLOCK(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="2600000037010002926c71abd20e4e09000000002000", @ANYRES32=r6, @ANYBLOB='\b\x00bdevself'], 0x26) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORUNLOCK(r8, 0x5381) capget(&(0x7f00000001c0)={0x20080522}, 0x0) 11:03:10 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af5630fde382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:10 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}, 0x7f000000}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 2086.740820][ T799] usb usb9: usbfs: process 799 (syz-executor.2) did not claim interface 0 before use [ 2086.832780][ T799] usb usb9: usbfs: process 799 (syz-executor.2) did not claim interface 0 before use 11:03:10 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f00000000c0)={0x8001001, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14, 0x69, 0x1, {0x8, 0x4, 0x4}}, 0x14) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x8000, 0x0) sendmsg$NL80211_CMD_START_AP(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_ATTR_HIDDEN_SSID={0x8}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x1d}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lseek(r0, 0x1, 0x0) r6 = ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) sendfile(0xffffffffffffffff, r6, &(0x7f0000000140)=0x7, 0xb2f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x20480, 0x0) 11:03:10 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f00000000c0)={{{0x1, 0x1}}, 0x55, 0xffffffc1, &(0x7f0000000040)="885db7203b8afad329ee10218e87b984c3f6d97781ad5f8902d86a8b5659b1c1bb6542b99c11a11f9681c8e0b6600bce6ea2389a659ba72b57fca844faf3921f6614041a8a29a117f5562efa4b793c8a31c664a560"}) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000000)={0x1, 0x1}) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) flistxattr(r1, &(0x7f00000001c0)=""/142, 0x8e) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r3, 0x29, 0xd3, &(0x7f0000000280)={{0xa, 0x4e22, 0x3, @empty, 0x4}, {0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x28}, 0x8}, 0x1, [0x5, 0x8000, 0x0, 0x6, 0x9, 0x96, 0x8, 0x20]}, 0x5c) [ 2087.054939][ T812] usb usb9: usbfs: process 812 (syz-executor.2) did not claim interface 0 before use 11:03:10 executing program 4: keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x4}) fremovexattr(r1, &(0x7f0000000080)=@random={'trusted.', 'cgroup\x00'}) lseek(r0, 0x1, 0x0) [ 2087.109731][ T813] usb usb9: Process 813 (syz-executor.2) called USBDEVFS_RESETEP for active endpoint 0x81 11:03:10 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}, 0x8dffffff}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f00000001c0)={0x2, [0x7, 0x9, 0x7], [{0x4a51, 0x401, 0x0, 0x1, 0x1}, {0xfb8d, 0x8, 0x0, 0x0, 0x1}, {0x0, 0x2}, {0x744, 0xff, 0x1, 0x1}, {0x2a, 0x5, 0x1, 0x1, 0x0, 0x1}, {0xfffffffa, 0x5, 0x1, 0x1}, {0x5, 0xc33a, 0x1, 0x1, 0x1, 0x1}, {0x3, 0xf1, 0x1, 0x1, 0x1, 0x1}, {0x7ff, 0x7fffffff, 0x0, 0x1}, {0x81, 0x1, 0x0, 0x0, 0x1}, {0x9, 0x6, 0x0, 0x1}, {0x5b, 0x3d, 0x1, 0x0, 0x0, 0x1}]}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_opts(r4, 0x29, 0x36, &(0x7f00000002c0)=""/105, &(0x7f0000000340)=0x69) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000f7a000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000c13000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000a00000/0x600000)=nil, &(0x7f0000c44000/0x3000)=nil, &(0x7f0000e8d000/0x3000)=nil, &(0x7f0000000040)="ccf65f3c883b7f615a8c66de3cecac47e8ed66f8e13e8004b4a50f899064333084a3a28228a4acc145f9a45c31a7bd8c76c4e0697b28861bcd15464e57d4cc602e58930ad843ea6cbb80a0ec98047c3c5fbbb6ed7c85c1fb56af0c564808a20cc88ddcb73d58adfcea4004ad878f9a73918de79358700d14ee41efc08732cf6b21c445f4b0edd3f49dbe0c3edf864a2b8b98fb9196857b4a015635dd1aebfd92a2b299f5d2fb3076cab75351a5754668847cb52fb260d39a54699271d56545fd094b5cc9fa81e9bfaeac48de3e65ca51fc94086d242e", 0xd6}, 0x68) 11:03:10 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2000045d}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 2087.831088][ T813] usb usb9: usbfs: process 813 (syz-executor.2) did not claim interface 0 before use [ 2087.856846][ T814] usb usb9: usbfs: process 814 (syz-executor.2) did not claim interface 0 before use 11:03:11 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0xf000000}], 0x2, 0x24004880) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x138, 0xd, 0xa, 0x301, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="c6bec316f4ef1ecad3", @typed={0xc, 0x1e, 0x0, 0x0, @u64=0xffff}, @generic="e7a730805a442f4b32b5b9261925d31fadaeadea383c81239572093dd5eed6c5bb5b433ea51b0b326b7e7b81032561c7ae423590cf501bf396aa766290c538032926d61c1af9452e3d82", @generic="d4761a778b8ffaec7f4d5a9a18853f30c0c4a5323661bfa2cfbf4df4b4e542beb5187d0194c1fcd08b72ef24f45d3d137185724a05c23688c9b57dd3b6a4dfd7891c02219d602a4d29e182e88262fc6906710ec99e8e16e8fa57af6ce165a462a46a83c1252c535bb5411715f59b46cf18816ce45a508a7b51c51a02a703d893376cf6c93669a17c4e5776a8f6d20e04052d4b287e257646c14a38bbca52af24a3ae3b4c67c45a3027dfd10728a0bf5eec7836fea849eada49a7ef196584560c3fc7"]}, 0x138}, 0x1, 0x0, 0x0, 0xce01d652eacfffd4}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 11:03:11 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x80000001, 0x0) 11:03:11 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}, 0xf0ffffff}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:11 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xe0, 0x464, 0x0, 0x0, 0x0, "70c967b0c3e6bfb9fc231620099bd2ac2bb635bb39f2e2659ce9cdb8fdbff28a328cc3f2122bd579b91ac27bcbad0e8a9234e5615366866973e089776ce96d21909434b50f2d5264f0241979cd5f2e1992114cbb8193996e5d19f58878f79a9d5bc488eacf3cf6194ba36765cd0ce709c942b4c40ccb40a8961eb9313add8fbe9509b34f392ac7d9913145b4f15c616567c1a5501463033be545495ba8ae666a6486627268e60a4e7eab2ff231937c259bc1632d37685e010c8454a9396ce90b994685f5355e553d90d6a7c933"}, 0xe0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x7fffefce}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:03:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000040)) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f00000000c0)={0x3, 0x1, 0x4, 0x0, 0xe5, &(0x7f0000000300)}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f00000002c0)) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f00000002c0)) capget(&(0x7f0000000080)={0x19980330, r5}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r7, 0x1, 0x0, 0x0, {{}, {}, {0x11}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r7, 0x2, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x1ff, @link='broadcast-link\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 11:03:11 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) 11:03:11 executing program 0: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={0x0, 0xc8}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d0a65a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}, 0xffffff7f}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 2234.285926][ T1143] INFO: task syz-executor.2:812 blocked for more than 143 seconds. [ 2234.294452][ T1143] Not tainted 5.7.0-rc6-syzkaller #0 [ 2234.301321][ T1143] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2234.311529][ T1143] syz-executor.2 D28392 812 7310 0x00004004 [ 2234.319210][ T1143] Call Trace: [ 2234.322521][ T1143] ? __schedule+0x937/0x1ff0 [ 2234.328282][ T1143] ? __sched_text_start+0x8/0x8 [ 2234.333496][ T1143] ? _raw_spin_lock_irqsave+0x94/0xbf [ 2234.339748][ T1143] ? debug_smp_processor_id+0x2f/0x185 [ 2234.345221][ T1143] ? schedule+0xd0/0x2a0 [ 2234.350436][ T1143] ? schedule_timeout+0x35c/0x850 [ 2234.356093][ T1143] ? find_held_lock+0x2d/0x110 [ 2234.361482][ T1143] ? usleep_range+0x160/0x160 [ 2234.367246][ T1143] ? wait_for_completion_timeout+0x15a/0x280 [ 2234.373307][ T1143] ? __next_timer_interrupt+0x190/0x190 [ 2234.379526][ T1143] ? rwlock_bug.part.0+0x90/0x90 [ 2234.384528][ T1143] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2234.398021][ T1143] ? _raw_spin_unlock_irq+0x1f/0x80 [ 2234.403262][ T1143] ? wait_for_completion_timeout+0x162/0x280 [ 2234.409732][ T1143] ? wait_for_completion_io_timeout+0x280/0x280 [ 2234.416213][ T1143] ? usb_submit_urb+0x6ed/0x13b0 [ 2234.421186][ T1143] ? lockdep_init_map_waits+0x1d3/0x890 [ 2234.426857][ T1143] ? usb_start_wait_urb+0x144/0x2b0 [ 2234.432506][ T1143] ? sg_clean+0x230/0x230 [ 2234.436958][ T1143] ? memset+0x20/0x40 [ 2234.441030][ T1143] ? usb_bulk_msg+0x228/0x550 [ 2234.445821][ T1143] ? proc_bulk+0x41a/0x780 [ 2234.450261][ T1143] ? processcompl_compat+0x670/0x670 [ 2234.457147][ T1143] ? kfree+0x1eb/0x2b0 [ 2234.461216][ T1143] ? tomoyo_path_number_perm+0x411/0x4d0 [ 2234.467054][ T1143] ? lockdep_hardirqs_on+0x463/0x620 [ 2234.472875][ T1143] ? tomoyo_path_number_perm+0x238/0x4d0 [ 2234.478727][ T1143] ? usbdev_ioctl+0x543/0x31e0 [ 2234.483518][ T1143] ? proc_do_submiturb+0x3530/0x3530 [ 2234.489023][ T1143] ? __fget_files+0x30d/0x500 [ 2234.493801][ T1143] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 2234.499780][ T1143] ? do_vfs_ioctl+0x50c/0x1360 [ 2234.504630][ T1143] ? ioctl_file_clone+0x180/0x180 [ 2234.511772][ T1143] ? __fget_files+0x32f/0x500 [ 2234.516726][ T1143] ? ksys_dup3+0x3c0/0x3c0 [ 2234.521499][ T1143] ? __x64_sys_futex+0x380/0x4f0 [ 2234.527877][ T1143] ? proc_do_submiturb+0x3530/0x3530 [ 2234.533193][ T1143] ? ksys_ioctl+0x11a/0x180 [ 2234.537825][ T1143] ? __x64_sys_ioctl+0x6f/0xb0 [ 2234.542791][ T1143] ? lockdep_hardirqs_on+0x463/0x620 [ 2234.548218][ T1143] ? do_syscall_64+0xf6/0x7d0 [ 2234.553068][ T1143] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2234.559887][ T1143] [ 2234.559887][ T1143] Showing all locks held in the system: [ 2234.568041][ T1143] 1 lock held by khungtaskd/1143: [ 2234.574294][ T1143] #0: ffffffff899bea80 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 2234.584261][ T1143] 2 locks held by in:imklog/6703: [ 2234.589381][ T1143] #0: ffff888097d71430 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 [ 2234.599579][ T1143] #1: ffffffff899bea80 (rcu_read_lock){....}-{1:2}, at: is_bpf_text_address+0x0/0x160 [ 2234.629767][ T1143] 2 locks held by syz-fuzzer/7040: [ 2234.634891][ T1143] #0: ffff8880ae637998 (&rq->lock){-.-.}-{2:2}, at: __schedule+0x233/0x1ff0 [ 2234.644259][ T1143] #1: ffff8880ae622ec8 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x304/0x410 [ 2234.656556][ T1143] [ 2234.658980][ T1143] ============================================= [ 2234.658980][ T1143] [ 2234.667487][ T1143] NMI backtrace for cpu 1 [ 2234.671833][ T1143] CPU: 1 PID: 1143 Comm: khungtaskd Not tainted 5.7.0-rc6-syzkaller #0 [ 2234.680259][ T1143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2234.694653][ T1143] Call Trace: [ 2234.698013][ T1143] dump_stack+0x188/0x20d [ 2234.703210][ T1143] nmi_cpu_backtrace.cold+0x70/0xb1 [ 2234.708838][ T1143] ? lapic_can_unplug_cpu.cold+0x3b/0x3b [ 2234.714563][ T1143] nmi_trigger_cpumask_backtrace+0x231/0x27e [ 2234.721255][ T1143] watchdog+0xa8c/0x1010 [ 2234.725630][ T1143] ? reset_hung_task_detector+0x30/0x30 [ 2234.731319][ T1143] kthread+0x388/0x470 [ 2234.735415][ T1143] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 2234.741177][ T1143] ret_from_fork+0x24/0x30 [ 2234.746733][ T1143] Sending NMI from CPU 1 to CPUs 0: [ 2234.752886][ C0] NMI backtrace for cpu 0 [ 2234.752892][ C0] CPU: 0 PID: 13718 Comm: kworker/u4:2 Not tainted 5.7.0-rc6-syzkaller #0 [ 2234.752898][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2234.752902][ C0] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 2234.752909][ C0] RIP: 0010:batadv_iv_ogm_schedule_buff+0xc37/0x1240 [ 2234.752919][ C0] Code: 04 00 00 4d 8b 24 24 49 81 fc 40 99 24 8d 0f 84 39 02 00 00 e8 ea dc c0 f9 49 8d 7c 24 70 48 89 f8 48 c1 e8 03 42 80 3c 30 00 <0f> 85 cc 04 00 00 48 8b 44 24 08 49 8b 5c 24 70 80 38 00 0f 85 c3 [ 2234.752923][ C0] RSP: 0018:ffffc90016877bb0 EFLAGS: 00000246 [ 2234.752930][ C0] RAX: 1ffff1101250ec0e RBX: 0000000000000000 RCX: ffffffff87b25a18 [ 2234.752934][ C0] RDX: 0000000000000000 RSI: ffffffff87b25836 RDI: ffff888092876070 [ 2234.752939][ C0] RBP: ffff8880a9391028 R08: ffff88808d438340 R09: ffffed1015272206 [ 2234.752944][ C0] R10: ffff8880a939102b R11: ffffed1015272205 R12: ffff888092876000 [ 2234.752948][ C0] R13: 0000000000000001 R14: dffffc0000000000 R15: ffffc90016877c38 [ 2234.752953][ C0] FS: 0000000000000000(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 2234.752957][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2234.752962][ C0] CR2: 00007fddb4ba5000 CR3: 00000000a4d9d000 CR4: 00000000001426f0 [ 2234.752966][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2234.752971][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 2234.752974][ C0] Call Trace: [ 2234.752977][ C0] ? batadv_iv_ogm_orig_dump+0xce0/0xce0 [ 2234.752982][ C0] batadv_iv_send_outstanding_bat_ogm_packet+0x5c8/0x7c0 [ 2234.752985][ C0] process_one_work+0x965/0x16a0 [ 2234.752988][ C0] ? lock_release+0x800/0x800 [ 2234.752991][ C0] ? pwq_dec_nr_in_flight+0x310/0x310 [ 2234.752994][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 2234.752998][ C0] worker_thread+0x96/0xe20 [ 2234.753001][ C0] ? process_one_work+0x16a0/0x16a0 [ 2234.753004][ C0] kthread+0x388/0x470 [ 2234.753007][ C0] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 2234.753010][ C0] ret_from_fork+0x24/0x30 [ 2234.755623][ T1143] Kernel panic - not syncing: hung_task: blocked tasks [ 2234.974297][ T1143] CPU: 1 PID: 1143 Comm: khungtaskd Not tainted 5.7.0-rc6-syzkaller #0 [ 2234.982788][ T1143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2234.992830][ T1143] Call Trace: [ 2234.996130][ T1143] dump_stack+0x188/0x20d [ 2235.000471][ T1143] panic+0x2e3/0x75c [ 2235.004374][ T1143] ? add_taint.cold+0x16/0x16 [ 2235.009063][ T1143] ? lapic_can_unplug_cpu.cold+0x3b/0x3b [ 2235.014779][ T1143] ? preempt_schedule_thunk+0x16/0x18 [ 2235.020251][ T1143] ? watchdog+0xa8c/0x1010 [ 2235.024763][ T1143] ? nmi_trigger_cpumask_backtrace+0x214/0x27e [ 2235.031097][ T1143] watchdog+0xa9d/0x1010 [ 2235.035341][ T1143] ? reset_hung_task_detector+0x30/0x30 [ 2235.040990][ T1143] kthread+0x388/0x470 [ 2235.045051][ T1143] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 2235.050964][ T1143] ret_from_fork+0x24/0x30 [ 2235.057253][ T1143] Kernel Offset: disabled [ 2235.061830][ T1143] Rebooting in 86400 seconds..