me failslab, interval 1, probability 0, space 0, times 0 [ 1659.661850] CPU: 0 PID: 18726 Comm: syz-executor0 Not tainted 4.18.0+ #194 [ 1659.668869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1659.678221] Call Trace: [ 1659.680813] dump_stack+0x1c9/0x2b4 [ 1659.684439] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1659.689665] should_fail.cold.4+0xa/0x11 [ 1659.693743] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1659.698863] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1659.703884] ? get_user_pages_fast+0x2a9/0x450 [ 1659.708483] ? __get_user_pages_fast+0x3f0/0x3f0 [ 1659.713249] ? kasan_kmalloc+0xc4/0xe0 [ 1659.717142] ? sock_kmalloc+0x156/0x1f0 [ 1659.721118] ? af_alg_get_rsgl+0x1d6/0x9a0 [ 1659.725381] ? skcipher_recvmsg+0x39e/0x1220 [ 1659.729814] ? graph_lock+0x170/0x170 [ 1659.733660] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1659.738693] ? find_held_lock+0x36/0x1c0 [ 1659.742759] ? __lock_is_held+0xb5/0x140 [ 1659.746829] ? check_same_owner+0x340/0x340 [ 1659.751147] ? rcu_note_context_switch+0x730/0x730 [ 1659.756070] __should_failslab+0x124/0x180 [ 1659.760324] should_failslab+0x9/0x14 [ 1659.764125] __kmalloc+0x2c8/0x760 [ 1659.767678] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1659.772700] ? iov_iter_advance+0x2ec/0x14e0 [ 1659.777096] ? sg_init_table+0x28/0x60 [ 1659.780973] ? sock_kmalloc+0x156/0x1f0 [ 1659.784940] sock_kmalloc+0x156/0x1f0 [ 1659.788729] ? __sk_mem_schedule+0xe0/0xe0 [ 1659.792966] ? rcu_read_lock_sched_held+0x108/0x120 [ 1659.797981] af_alg_get_rsgl+0x1d6/0x9a0 [ 1659.802050] ? af_alg_make_sg+0x4f0/0x4f0 [ 1659.806227] ? af_alg_alloc_areq+0x1ec/0x280 [ 1659.810657] ? alg_accept+0x60/0x60 [ 1659.814317] ? kasan_check_write+0x14/0x20 [ 1659.818571] ? sock_kfree_s+0x47/0x60 [ 1659.822367] skcipher_recvmsg+0x39e/0x1220 [ 1659.826613] ? skcipher_bind+0x30/0x30 [ 1659.830523] ? move_addr_to_kernel.part.18+0x100/0x100 [ 1659.835805] ? security_socket_recvmsg+0x9b/0xc0 [ 1659.840555] ? skcipher_bind+0x30/0x30 [ 1659.844439] sock_recvmsg+0xd0/0x110 [ 1659.848159] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1659.853180] ___sys_recvmsg+0x2b6/0x680 [ 1659.857152] ? ___sys_sendmsg+0x930/0x930 [ 1659.861303] ? lock_downgrade+0x8f0/0x8f0 [ 1659.865467] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1659.871026] ? proc_fail_nth_write+0x9e/0x210 [ 1659.875544] ? fget_raw+0x20/0x20 [ 1659.879007] ? find_held_lock+0x36/0x1c0 [ 1659.883062] ? kasan_check_write+0x14/0x20 [ 1659.887383] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1659.892432] ? wait_for_completion+0x8d0/0x8d0 [ 1659.897032] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1659.902578] ? sockfd_lookup_light+0xc5/0x160 [ 1659.907074] __sys_recvmsg+0x11a/0x290 [ 1659.910953] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1659.915521] ? __sb_end_write+0xac/0xe0 [ 1659.919486] ? fput+0x130/0x1a0 [ 1659.922758] ? ksys_write+0x1ae/0x260 [ 1659.926567] ? ksys_ioctl+0x81/0xd0 [ 1659.930187] __x64_sys_recvmsg+0x78/0xb0 [ 1659.934239] do_syscall_64+0x1b9/0x820 [ 1659.938114] ? finish_task_switch+0x1d3/0x870 [ 1659.942598] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1659.947523] ? syscall_return_slowpath+0x31d/0x5e0 [ 1659.952460] ? __switch_to_asm+0x34/0x70 [ 1659.956529] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1659.961893] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1659.966728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1659.971910] RIP: 0033:0x457089 [ 1659.975103] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1659.994023] RSP: 002b:00007febb5ea3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f 22:38:47 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r1, &(0x7f0000000240)='U', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000001380), &(0x7f00000003c0)="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", 0xc42, 0xffffffffffffffff) [ 1660.001723] RAX: ffffffffffffffda RBX: 00007febb5ea46d4 RCX: 0000000000457089 [ 1660.008998] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 1660.016268] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 1660.023644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1660.030926] R13: 00000000004d3818 R14: 00000000004c84e6 R15: 000000000000000a 22:38:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x300000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:47 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:47 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x408500, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000080)=@llc={0x1a, 0x33d, 0x2, 0x3, 0x69d, 0xffff, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)="9241cd376dc8d106ea8e5b81b8a3fd2487c91ce645139d9ebcf9caca6a30ca054a009cb392ce0b06695eee0cee1134ab214bc7389248969b38d842f78ca121235d239bee6f14fd95c27c7ec2a12450a77b2c6bc4c38cffb4e8c89fecbb96733d1de843fd4cbba419167f4f11d650e79104e70dd7fe4fdd2260f59cdc53e8a423b9", 0x81}], 0x1, &(0x7f0000001940)=ANY=[@ANYBLOB="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"], 0x10b8, 0x40000}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=@migrate={0xac, 0x21, 0x9, 0x0, 0x0, {{@in=@broadcast, @in=@remote}}, [@migrate={0x5c, 0x11, [{@in=@local, @in6=@mcast1}, {@in=@local, @in6}]}]}, 0xac}}, 0x0) 22:38:47 executing program 4: r0 = memfd_create(&(0x7f0000000240)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb200e1d6c80c93a877f42c468251221848dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aaff070000000000004b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b8281bbc19a6640077f12595d29dbe1a392ffc8b46276a84525b9b60cd3fd0c5", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0xc, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:38:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x8dffffff00000000) [ 1660.217404] Option 'qq&;җihu4@Ɣ5_*9rt' to dns_resolver key: bad/missing value 22:38:47 executing program 0 (fault-call:5 fault-nth:11): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:47 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b, 0x0}, 0x0) 22:38:47 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x121140, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) socket$inet_udplite(0x2, 0x2, 0x88) 22:38:47 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:47 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="ac0000002100090000000000ff010000ffffffffd6b500000000000000000000ac1414bb00000000000000000000000000000000000000000000000000ff0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000005c001100ac1414aa000000000000000000000000ff010000000000000000000000000001000000000000000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xac}}, 0x0) 22:38:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x8dffffff) 22:38:47 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0xff, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000440)={0x1, 0x15f80000, 0x5e63, 'queue0\x00', 0x1d5f}) keyctl$join(0x1, &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000040)=0x2, r1, 0x0, 0x0, 0x1}}, 0x20) write$cgroup_type(r0, &(0x7f00000002c0)='threaded\x00', 0x9) unlink(&(0x7f0000000100)='./file0\x00') openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) 22:38:47 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b, 0x0}, 0x0) 22:38:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x102d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbd, 0x0, 0x2}, [@ldst={0x7, 0x18d1fb, 0x0, 0x1d1}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195}, 0x48) 22:38:47 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000080), 0xc, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="ac000000210009000000000000000000ffffffff000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000005c001100ac1414aa000000000000000000000000ff010000000000000000000000000001000000000000000000000000ac1414aa00000000000000000000000000faffffff0000000000000000009603000000000018000000000000"], 0x4}}, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x200, 0x0) 22:38:47 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) [ 1660.557437] FAULT_INJECTION: forcing a failure. [ 1660.557437] name failslab, interval 1, probability 0, space 0, times 0 [ 1660.568817] CPU: 1 PID: 18779 Comm: syz-executor0 Not tainted 4.18.0+ #194 [ 1660.575920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1660.585369] Call Trace: [ 1660.587982] dump_stack+0x1c9/0x2b4 [ 1660.591633] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1660.596945] ? find_held_lock+0x36/0x1c0 [ 1660.601033] should_fail.cold.4+0xa/0x11 [ 1660.605127] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1660.610268] ? __lock_is_held+0xb5/0x140 [ 1660.614349] ? graph_lock+0x170/0x170 [ 1660.618209] ? find_held_lock+0x36/0x1c0 [ 1660.622293] ? __lock_is_held+0xb5/0x140 [ 1660.626387] ? check_same_owner+0x340/0x340 [ 1660.630729] ? rcu_read_lock_sched_held+0x108/0x120 [ 1660.635763] ? rcu_note_context_switch+0x730/0x730 [ 1660.640708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1660.646271] __should_failslab+0x124/0x180 [ 1660.650539] should_failslab+0x9/0x14 [ 1660.654364] __kmalloc+0x2c8/0x760 [ 1660.657925] ? af_alg_make_sg+0x4f0/0x4f0 [ 1660.662091] ? sock_kmalloc+0x156/0x1f0 [ 1660.666091] sock_kmalloc+0x156/0x1f0 [ 1660.669915] ? __sk_mem_schedule+0xe0/0xe0 [ 1660.674185] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1660.679755] ? af_alg_count_tsgl+0x1bc/0x250 [ 1660.684195] ? sock_kfree_s+0x47/0x60 [ 1660.688023] skcipher_recvmsg+0x4ee/0x1220 [ 1660.692291] ? skcipher_bind+0x30/0x30 [ 1660.696198] ? move_addr_to_kernel.part.18+0x100/0x100 [ 1660.701487] ? security_socket_recvmsg+0x9b/0xc0 [ 1660.706255] ? skcipher_bind+0x30/0x30 [ 1660.710173] sock_recvmsg+0xd0/0x110 [ 1660.713905] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1660.718934] ___sys_recvmsg+0x2b6/0x680 [ 1660.722931] ? ___sys_sendmsg+0x930/0x930 [ 1660.727097] ? lock_downgrade+0x8f0/0x8f0 [ 1660.731264] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1660.736821] ? proc_fail_nth_write+0x9e/0x210 [ 1660.741352] ? fget_raw+0x20/0x20 [ 1660.744809] ? find_held_lock+0x36/0x1c0 [ 1660.748887] ? kasan_check_write+0x14/0x20 [ 1660.753127] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1660.758068] ? wait_for_completion+0x8d0/0x8d0 [ 1660.762681] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1660.768244] ? sockfd_lookup_light+0xc5/0x160 [ 1660.772758] __sys_recvmsg+0x11a/0x290 [ 1660.776665] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1660.781255] ? __sb_end_write+0xac/0xe0 [ 1660.785237] ? fput+0x130/0x1a0 [ 1660.788523] ? ksys_write+0x1ae/0x260 [ 1660.792336] ? ksys_ioctl+0x81/0xd0 [ 1660.795972] __x64_sys_recvmsg+0x78/0xb0 [ 1660.800042] do_syscall_64+0x1b9/0x820 [ 1660.803936] ? finish_task_switch+0x1d3/0x870 [ 1660.808440] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1660.813375] ? syscall_return_slowpath+0x31d/0x5e0 [ 1660.818312] ? __switch_to_asm+0x34/0x70 [ 1660.822379] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1660.827757] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1660.832613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1660.837812] RIP: 0033:0x457089 [ 1660.841013] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1660.859945] RSP: 002b:00007febb5ea3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1660.867681] RAX: ffffffffffffffda RBX: 00007febb5ea46d4 RCX: 0000000000457089 [ 1660.874956] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 1660.882237] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 1660.889511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1660.896782] R13: 00000000004d3818 R14: 00000000004c84e6 R15: 000000000000000b 22:38:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x700000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:48 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b, 0x0}, 0x0) 22:38:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0xf0ffffff) 22:38:48 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=@migrate={0xac, 0x21, 0x9, 0x0, 0x0, {{@in=@broadcast, @in=@remote}}, [@migrate={0x5c, 0x11, [{@in=@local, @in6=@mcast1}, {@in=@local, @in6}]}]}, 0x42}}, 0x0) 22:38:48 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:48 executing program 0 (fault-call:5 fault-nth:12): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:48 executing program 5: 22:38:48 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0x7, @remote, 0x9}}, 0x819f, 0x0, 0x8, 0x0, 0xb4b553e3fd0cec2}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={r1, @in6={{0xa, 0x4e24, 0x59, @dev={0xfe, 0x80, [], 0x15}, 0x400}}, 0x4, 0x4, 0x999d, 0x2, 0x2}, 0x98) 22:38:48 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b, 0x0}, 0x0) 22:38:48 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000210009000000000000000000ffffffff000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000005c001100ac1414aa000000000100000000000000ff0100000000000000000000000000ac1414aa000000000000000000004ef304b9c47f807b000000088100000000000000000000000000000000000000"], 0xac}}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x8, 0x101000) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000140)=0x100000000) 22:38:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0xfffffdef) 22:38:48 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:48 executing program 5: 22:38:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0xfffffff0) 22:38:48 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b, 0x0}, 0x0) 22:38:48 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="ac000000210009000000000000000000ffffffff000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000005c001100ac1414aa000000000000000000000000ff010000000000000000000000000001000000000000000000000000ac140013000000000000000000000000000000001c4c34557102fd02"], 0xac}}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6, 0x100480000) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000080)={{0x1, 0x3, 0xffffffffffffff7f, 0x3, 0x4}, 0x10001, 0x10000, 'id1\x00', 'timer1\x00', 0x0, 0x7, 0x5, 0x5, 0x8}) 22:38:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x10000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:49 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:49 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x4000) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) semget(0x0, 0x4, 0x580) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000040)="272862646576656d30e06574683121637075736574626465765b282f6b657972696e67656d310d00", &(0x7f0000000140)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", &(0x7f0000000240)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", &(0x7f00000002c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", &(0x7f0000000340)='\x00', &(0x7f0000000380)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", &(0x7f0000000400)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", &(0x7f0000000480)="707070305d5b2ab76d643573756d776c616e3173656c662700"], &(0x7f00000008c0)=[&(0x7f0000000500)='\x00', &(0x7f0000000540)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", &(0x7f00000005c0)='\x00', &(0x7f0000000600)='$vboxnet0[em1^\x00', &(0x7f0000000640)='*vboxnet0\x00', &(0x7f0000000680)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", &(0x7f0000000700)='-wlan0\x00', &(0x7f0000000740)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", &(0x7f00000007c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", &(0x7f0000000840)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828"], 0x1900) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') signalfd(r0, &(0x7f0000000940)={0x81}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000980)='/dev/full\x00', 0x0, 0x0) unlink(&(0x7f0000000100)='./file0\x00') 22:38:49 executing program 5: 22:38:49 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="ac000000210009000000000000000000ffffffff000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000005c001100ac1414aa000000000000000000000000ff010000000000000000000000000001000000000000000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000e2733021b2d34d7e9e2bfe8faab05e64761da3e310b132b5093c14a2c7b864b24a36c5a70939fccad0ef0931fe64416e7d8e3f2c652b941cbf7a"], 0xac}}, 0x0) 22:38:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:49 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b, 0x0}, 0x0) 22:38:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0xf0ffffff00000000) 22:38:49 executing program 5: 22:38:49 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) 22:38:49 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=@migrate={0xac, 0x21, 0x9, 0x0, 0x0, {{@in=@broadcast, @in=@remote}}, [@migrate={0x5c, 0x11, [{@in=@local, @in6=@mcast1}, {@in=@local, @in6}]}]}, 0xac}}, 0x0) socketpair(0xe, 0xb6907e4fc28dcac4, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x7fffffff, @remote, 0x5}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e21, 0x1, @remote, 0x7}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e24, 0x800, @loopback, 0x7ff}, @in6={0xa, 0x4e23, 0x101, @mcast2, 0x101}], 0xc0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e21, @local}}, 0x200, 0x1000, 0x2, "110238584bbedc24ec7c1d9200edcd98adb049c50578d9f12897665155d01e90426429de65f7f5085b8a00ff00cd1eadf997a7a545c8bce4281da25c8e361cf2cd62724d9a768987a00b2a017a4157bf"}, 0xd8) 22:38:49 executing program 5: 22:38:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000040)={0x7b}) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0x40000090}]}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=@migrate={0xac, 0x21, 0x9, 0x0, 0x0, {{@in=@broadcast, @in=@remote}}, [@migrate={0x5c, 0x11, [{@in=@local, @in6=@mcast1}, {@in=@local, @in6}]}]}, 0xac}}, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0xe0000, 0x0) sendto$llc(r4, &(0x7f0000000140)="c477316ad648104d5b74b653a60a78612004291d0e67a0b12821d9f148e13ccf2cb075370305987c616e16afd7db23eb6f2aeee2171b263cc4388cefd33e2c6743e9d79f48b97a27fb40afcbfd9201a1c6148b0899bb4d3e70ccebe656724b0fe68173c1a0a87ea58c53004ea61678d84300787ff716297abbedb5297f6c3605e939338166335a75526c8e6c3606432de71f24c23806c33aec3c7d7fa2d1acc9512c6081d34155d947abe0d126f84749f3b25c1274c7a979796cf64cf25ff2d2ef00610f54dd6fd7a5ecf94ab7ef4a295490073e6f520cc5a14d13974d20ac454bd15c855436da4c", 0xe8, 0x90, &(0x7f0000000240)={0x1a, 0x0, 0x63ef, 0x0, 0xa5ed, 0xffffffffffffbcb8, @dev={[], 0x15}}, 0x10) 22:38:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x5300000000000000) 22:38:49 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b, 0x0}, 0x0) 22:38:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b8100ca944f64f646f9a3e0269befa8f70000000000008000f0fffeffff090000dc2abbeabdcb95044e19618f5e9ca56f00010006fad004", 0x58}], 0x1) 22:38:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:50 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x100000000007f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:38:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0xeffdffff00000000) 22:38:50 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x53) 22:38:50 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) r2 = geteuid() getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={0x0, @remote, @broadcast}, &(0x7f0000000140)=0xc) r4 = getuid() ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f00000006c0)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000040), 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=@polexpire={0x448, 0x1b, 0x4, 0x70bd2a, 0x25dfdbff, {{{@in=@dev={0xac, 0x14, 0x14, 0x16}, @in6=@remote, 0x4e22, 0x0, 0x4e24, 0x9, 0xa, 0xa0, 0xa0, 0x3f, r1, r2}, {0x5, 0x608, 0x80000000, 0x955d, 0x9412, 0x3, 0x10000, 0x1}, {0x100, 0x7, 0xe, 0x80}, 0x7, 0x6e6bbf, 0x1, 0x1, 0x1}, 0x1}, [@policy={0xac, 0x7, {{@in6=@loopback, @in6=@ipv4={[], [], @remote}, 0x4e21, 0x8, 0x4e24, 0x7fffffff, 0x2, 0x20, 0x80, 0x3f, r3, r4}, {0x5, 0x0, 0x80000001, 0x1f, 0x2330, 0x1f, 0x6, 0xffffffffffffffff}, {0x8000, 0x4220, 0x800, 0x4a2}, 0x3, 0x6e6bbc, 0x1, 0x1, 0x2, 0x3}}, @tmpl={0x144, 0x5, [{{@in=@remote, 0x4d2, 0xff}, 0x2, @in6=@mcast2, 0x3506, 0x4, 0x3, 0x3f80000000000, 0x3a0000000000, 0x236c0c22, 0x401}, {{@in6=@remote, 0x4d4, 0x33}, 0x2, @in=@rand_addr=0x7, 0x3503, 0x3, 0x2, 0x1f, 0x81, 0x0, 0x80}, {{@in=@dev={0xac, 0x14, 0x14, 0x1f}, 0x4d3, 0x3b}, 0x2, @in6, 0x3507, 0x3, 0x3, 0x3, 0x2, 0x5afe, 0xfffffffffffffc51}, {{@in6=@remote, 0x4d3, 0x32}, 0x0, @in=@local, 0x3503, 0x4, 0x0, 0x8a00000000000, 0x3f, 0x9, 0x200}, {{@in6=@local, 0x4d3, 0xff}, 0xa, @in6=@local, 0x3502, 0x6, 0x3, 0xe16386, 0x5, 0x5a04}]}, @policy={0xac, 0x7, {{@in6, @in6=@loopback, 0x4e21, 0x6, 0x4e24, 0x401, 0xa, 0xa0, 0x80, 0x33, r5, r6}, {0x10000, 0x7, 0x401, 0x3, 0x2, 0x7, 0x6, 0x6}, {0x5, 0x4, 0x6, 0x800}, 0x6, 0x6e6bbb, 0x2, 0x0, 0x3, 0x1}}, @tfcpad={0x8, 0x16, 0x77}, @extra_flags={0x8, 0x18, 0x3}, @algo_aead={0x98, 0x12, {{'gcm(cipher_null-generic)\x00'}, 0x260, 0x0, "2ab93fd50d13320366adc85b22e0639dc0a51ab47716585d98fc3b54e3e4ee4b8ba9f7a914a8133e52c4c8b23000883698fbad18138ed6b0db713fc97670f1d9278b5577234b90274aff05bd"}}, @replay_esn_val={0x30, 0x17, {0x5, 0x70bd2a, 0x70bd26, 0x70bd28, 0x70bd27, 0x7fff, [0x4, 0x2, 0x8000, 0x4, 0xfffffffffffffffd]}}, @srcaddr={0x14, 0xd, @in6=@mcast2}]}, 0x448}}, 0x0) 22:38:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x10000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000780)='user\x00', &(0x7f00000008c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000900)="954e", 0x2, 0xfffffffffffffffc) 22:38:50 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0xeffdffff) 22:38:50 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf64(r0, &(0x7f0000000840)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x3, 0x8, 0x1, 0x800, 0x3, 0x3, 0x166a, 0x17f, 0x40, 0x28a, 0x8, 0xffffffffffffff81, 0x38, 0x1, 0x5, 0x5, 0x3}, [{0x7, 0x7, 0xd6, 0x774, 0x7, 0x2, 0x6e33130b, 0x10000}, {0x7, 0x7, 0x200, 0x101, 0x2, 0x5, 0x10000, 0x8}], "ad26e0f93e3b4594583ff23a0cd255946a374262af98de5be0b334005d4608ca90a82169f5133600eb2a4c8559b844c68e286b8235e749aaf2d79d291fcb17705cebc9374998f4f23555f7e1002a5d8b8817d8d6d68279a97a03bc6d14167d038bf525d67d3d0590adb47881fad6f27065f7521a016d564d", [[], [], []]}, 0x428) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=@migrate={0xac, 0x21, 0x9, 0x0, 0x0, {{@in=@broadcast, @in=@remote}}, [@migrate={0x5c, 0x11, [{@in=@local, @in6=@mcast1}, {@in=@local, @in6}]}]}, 0xac}}, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x80000, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)=0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f00000004c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @local}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000000600)=0xe8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000700)=0x0) fstat(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r1, &(0x7f0000000e40)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000180)="e3f294671edbb56ae1d3ca8fe3fd1d384e6e", 0x12}], 0x1, &(0x7f0000000d40)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}], 0xc8, 0x4}, 0x8080) r11 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x8000, 0x0) write$P9_RXATTRWALK(r11, &(0x7f0000000080)={0xf, 0x1f, 0x1, 0x8}, 0xf) 22:38:50 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x8dffffff00000000) 22:38:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000005c0)="1a8c443d3a568c81cc096aa87ddab0f1b182da383fd71795f41053261e63b0b9f1283f7431b6146106716c21b43625f9194bf4b6a5dba53c46b82862a2f804121cda7e6be8fd507bb1545de629746d878f10be8036e98a270c42d6458f97b342303464e94ccb6d6f4f81941e3f3fa371596cdf17e160c992140c9dc81362f019f017", 0x82, 0x0, &(0x7f0000000500)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='scalable\x00', 0x9) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/226, 0xe2}], 0x1) recvfrom(r0, &(0x7f0000000380)=""/239, 0xff4e, 0x0, 0x0, 0x307) close(r0) 22:38:50 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0xf0ffffff00000000) 22:38:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x53000000) 22:38:50 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=@migrate={0xac, 0x21, 0x9, 0x0, 0x0, {{@in=@broadcast, @in=@remote}}, [@migrate={0x5c, 0x11, [{@in=@local, @in6=@mcast1}, {@in=@local, @in6}]}]}, 0xac}}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200000, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000001c0)={0xa, &(0x7f0000000080)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {}, {0x0, 0x0, 0x0, @random}, {}]}) 22:38:50 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x5300000000000000) 22:38:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x300, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:51 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x14000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="ac000000210009000000000000000000ffffffff000000000000000000000000ac1414bb00007300000000000000000000000000000000000000000000000000562054f112a0518926bc1ca7e54272cf8100e68a70e38b12ab4610a50af8199ab7eff334f0175107caca5452e47b4c96fd12c35e39d3546c40c3a910f75c7dbb8c730d9f8195795c202d483e406c2121dc803d1138ebada36f639f819e40df5a28d2c2903915b74f6637826f19ec7b5fc7c7ca780d22d77cefc21718f400d87f57e9c84952aa0c1e543edfcf0c67a3f51f326b0048", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000005c001100ac1414aa000000000000000000000000ff010000000000000000000000000001000000000000000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xac}}, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000200)) 22:38:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x5300) 22:38:51 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x8dffffff) 22:38:51 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000000)=0x1004220, 0x4) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') [ 1664.049262] netlink: 92 bytes leftover after parsing attributes in process `syz-executor1'. [ 1664.077707] netlink: 92 bytes leftover after parsing attributes in process `syz-executor1'. 22:38:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x300, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:51 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0xf0ffffff) 22:38:51 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2000, 0x0) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={{0x0, 0x7530}, {0x77359400}}) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000240)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e21, 0x1ff, @remote, 0x5}}, 0x8, 0x6ca}, 0x90) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0xffffffffffffff28) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r1, 0x0, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:51 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=@migrate={0xac, 0x21, 0x9, 0x0, 0x0, {{@in=@broadcast, @in=@remote}}, [@migrate={0x5c, 0x11, [{@in=@local, @in6=@mcast1}, {@in=@local, @in6}]}]}, 0xac}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000080)={0xd5, 0x2, 0xff, "140a87b9c95a5b53441a9308f51928313a2f8eed70147ba582485e269fef4e8475d82493d48dbd8dc5fd3d20f57a1576bb99574f7fb849159ba65573da549ba4d502400243bf647f8cd626faeafb7bfe5945c7b15ae32c6cca1dd408d87d47013ef2a63456a522cec0ca0b7390fb81ce87c167fbf95022f3379adc77d9e41af43c2b0acd4eed2183c627a1efecc6aaedfc4f873e3606474133931a539c63d012fca78630f9e3884fae6a670d5531b7ec4a6661ad539a3a7c32ac4bd8b2bb790dfa65870abf0fad72ac9aea188fd235b717ee00e33b"}) 22:38:51 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:51 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:38:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="08000000aef79fc64ede817d28714b799732653203c2223c4d458e808846250304db7c"], &(0x7f0000000180), 0xca0a24c4c9de509a) 22:38:51 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0xfffffdef) 22:38:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200000, 0x0) recvmmsg(r0, &(0x7f0000003f40)=[{{&(0x7f00000004c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)=""/192, 0xc0}, {&(0x7f00000007c0)=""/130, 0x82}], 0x2, &(0x7f0000000880)=""/228, 0xe4, 0x5}, 0x9}, {{&(0x7f0000000980)=@ipx, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000a00)=""/38, 0x26}, {&(0x7f0000000a40)=""/4, 0x4}], 0x2, &(0x7f0000000ac0)=""/251, 0xfb}, 0x80000000000000}, {{0x0, 0x0, &(0x7f0000003e40)=[{&(0x7f0000000bc0)=""/221, 0xdd}, {&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000001cc0)=""/229, 0xe5}, {&(0x7f0000001dc0)=""/4096, 0x1000}, {&(0x7f0000002dc0)=""/4096, 0x1000}, {&(0x7f0000003dc0)=""/43, 0x2b}, {&(0x7f0000003e00)=""/35, 0x23}], 0x7, &(0x7f0000003ec0)=""/116, 0x74, 0x8}, 0x6}], 0x3, 0x40, &(0x7f0000004000)={0x77359400}) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000004040)={@rand_addr=0x3a33, @multicast2, r2}, 0xc) r3 = accept$alg(r0, 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x1}, 0x8) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:51 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xff, 0x501c00) ioctl$KDDISABIO(r1, 0x4b37) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="ac000100210009000000000000000000ffffffff0000000000000000000000000000000000000000000000200000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000005c001100ac1414aa000000000000000000000000ff010000000000000000000000000001000000000000000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xac}}, 0x0) 22:38:51 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x2, 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0x68d77dbc) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000000)={0x5, 0x6, 0x1, 0x0, 0x1f}) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:38:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2d9, 0x40000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0x8, 0xc2bc, "22273310bee57e382d3d87d2df745ff748851e6565ea187e17a43f99d18f5418db92cb5d572e494d08e2dc36acb38afaa92ec01f8950525b04a55dbe79698f2556f13ea8bc158786b75fe53b1f219f2852f2c2636c14342d7561eeb056988bd25292dff21e91ccf389a6ceeed224cf3e8e1e4139505aaa182fcbe4741d156db976f0e9b32c05814bab83fabdd85f7c5fa80f451f0b2e20fc32a5ef6f92ed0e3eced71a19018e42349ec03dd1f99b636a9a9ae0eda36c6d96a1d844ed5cc901a0f72f6b7705921539f1c1aff5d3e4237fcd488f65a1364ecb3e615345c89bfe8117e7da48eeeceec9fcc98a843e2ac73a281c12f5d6127b1222999281bfa33771", 0x19, 0x2, 0x4, 0x1, 0x101, 0x77a0, 0x100000001}, r3}}, 0x120) 22:38:52 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000210109000010000000000000ffffffff000000000000000000000000ac1414bb000000000000000000000000000000020000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000005c001100ac1414aa000000000000000000000000ff010000000000000000000000000001000000000000000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000f27525252607b7258150300f50bc1127d8796874eb8dbb8fed420a6ef1d708ae426d395f4bfd8686bb78e97c12"], 0xac}}, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x8, 0x2400) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180)={0x2}, 0x4) 22:38:52 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f00000000c0)=@ethtool_ringparam={0x6}}) 22:38:52 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0xffffff8d) 22:38:52 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=@migrate={0xac, 0x21, 0x9, 0x0, 0x0, {{@in=@broadcast, @in=@remote}}, [@migrate={0x5c, 0x11, [{@in=@local, @in6=@mcast1}, {@in=@local, @in6}]}]}, 0xac}}, 0x0) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffff8, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="973e3027536e96da862903a3a50e7674d9c8f2781282c695e291fa0db7072dcca376a56547aae1b7069f9fcbb0ca7b839e82b91420fc0b3e2ee2ae4351acfedb6c7f9f45f27e231df1c104c64c83bb122d3063", 0x53, 0xffffffffffff7fff}], 0x20, &(0x7f0000000180)='systemself\x00') 22:38:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:52 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x53000000) 22:38:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000eff0)=[{&(0x7f00000001c0)="240000001900030007ff0907000083be8020000000040005035a5bf4d31d85680300a33f", 0x24}], 0x1}, 0x0) 22:38:52 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:52 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000e4cfe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000013000)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0f85403, &(0x7f0000000000)={0x1}) dup3(r1, r0, 0x0) 22:38:52 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) close(r0) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=@migrate={0xac, 0x21, 0x9, 0x0, 0x0, {{@in=@broadcast, @in=@remote}}, [@migrate={0x5c, 0x11, [{@in=@local, @in6=@mcast1}, {@in=@local, @in6}]}]}, 0x300}}, 0x40) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@rand_addr, @broadcast, 0x0}, &(0x7f0000000180)=0xc) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000380)=0xe8) fstat(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f0000000700)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)=@polexpire={0x1bc, 0x1b, 0x1, 0x70bd29, 0x25dfdbfe, {{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast2, 0x4e22, 0x1, 0x4e20, 0x0, 0x0, 0x20, 0xa0, 0x2b, r1, r2}, {0x5, 0x6, 0x4, 0xfff, 0xfffffffffffffff8, 0x80000001, 0x4, 0x9c00000000000000}, {0x5, 0x200, 0x5, 0x108}, 0x100, 0x6e6bbd, 0x3, 0x1, 0x3, 0x3}, 0x5}, [@replay_val={0x10, 0xa, {0x70bd2c, 0x70bd2a, 0x6}}, @proto={0x8, 0x19, 0xff}, @sa={0xe4, 0x6, {{@in=@dev={0xac, 0x14, 0x14, 0x15}, @in6=@dev={0xfe, 0x80, [], 0x18}, 0x4e24, 0x0, 0x4e22, 0x4, 0xa, 0x20, 0x0, 0x3b, r3, r4}, {@in=@local, 0x4d2, 0x3c}, @in6=@mcast1, {0xfffffffffffffffc, 0xfffffffffffffffc, 0x3, 0xfffffffffffff001, 0x6, 0x9ce, 0x7f, 0x6}, {0x5, 0x254c4547, 0x8, 0x2}, {0x3, 0x7, 0x3}, 0x70bd29, 0x3503, 0x2, 0x7, 0x7, 0x1}}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x40}, 0x44090) 22:38:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:52 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0xeffdffff) 22:38:52 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'ip6_vti0\x00', {0x2, 0x4e21, @multicast2}}) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:38:53 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=@migrate={0xac, 0x21, 0x9, 0x0, 0x0, {{@in=@broadcast, @in=@remote}}, [@migrate={0x5c, 0x11, [{@in=@local, @in6=@mcast1}, {@in=@local, @in6}]}]}, 0xac}}, 0x0) socketpair(0x5, 0x80e, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r3, 0x9, 0x0, 0x0, 0x0, @ib={0x1b, 0x7, 0x367, {"8dc714f47e1568b2cc9e44e1e49529b8"}, 0x8000, 0x9, 0x5}, @in6={0xa, 0x4e22, 0x0, @remote, 0x100000000}}}, 0x118) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={0x0, 0x4aae}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000002c0)={r4, 0x800}, 0x8) 22:38:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x100000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:53 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x5300) 22:38:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:53 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000001a40)=[{{&(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000018c0), 0x0, &(0x7f0000001980)=""/185, 0xb9}}], 0x1, 0x0, &(0x7f0000001ac0)) r2 = accept4(r0, 0x0, &(0x7f0000000340)=0xff92, 0x0) write$binfmt_misc(r2, &(0x7f0000000040)={'syz0'}, 0x34000) 22:38:53 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f0000000240)="912c037985191707c7267d9a87f04a70cec06bbdfa159622fff076160969db5ae212ca6e71379f851a644ed1a828810429cb8e6a349ebb4b50a43f2f24f8856bed9e006089ed3ae177e03017f73d2cdb5a7061", 0x53, 0x18) mmap(&(0x7f000000e000/0x2000)=nil, 0x2000, 0x8, 0x11, r0, 0x100000000) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="11000000086c30cce71ef9f6e5b5db0b5d60cec05436f943748179c6ad82a4a45aa30fac930a32c37007eaa5054dc52c74e386fdc2d415"], &(0x7f0000000100)=0x19) ppoll(&(0x7f0000000180)=[{r0, 0x8040}], 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300)={0x2}, 0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x5, 0xffffffffffff42a2, 0xec, 0x5, 0x6}, 0x14) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000040)='./file0\x00') 22:38:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x7, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:53 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=@migrate={0xac, 0x21, 0x9, 0x0, 0x0, {{@in=@broadcast, @in=@remote}}, [@migrate={0x5c, 0x11, [{@in=@local, @in6=@mcast1}, {@in=@local, @in6}]}]}, 0xac}}, 0x0) r1 = semget(0x0, 0x1, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@dev, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f00000004c0), &(0x7f0000000500)=0x0) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000540)={{0x1000, r2, r3, r4, r5, 0x2, 0x6}, 0x1, 0x0, 0x9}) 22:38:53 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0xfffffff0) 22:38:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1000, 0x8042) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x10000, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000240)={0x2000, &(0x7f0000000040), 0x2, r3, 0x3}) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:53 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0xec, 0xfffffffffffffff8, 0x6, 0x4, 0x3, 0x7, 0x400, 0x18a, 0x40, 0x3b5, 0xffffffff, 0x3b, 0x38, 0x1, 0x2, 0x8000, 0x7049}, [{0x2, 0x4, 0x0, 0x10000, 0x3ff, 0x2, 0x200, 0xae4}], "c978a0f0b57c65a7", [[], [], [], [], [], [], [], [], [], []]}, 0xa80) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:38:53 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:53 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r2 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x20, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r1, 0x4) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="ac000000210009000000000000000000ffffffff000000000000000000000000ac1414bb000000000000000000000000000000000000001e0000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000005c001100ac1414aa000000000000000000000000ff010000000000000000000000000001000000000000000000000000ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000003941af7622361a55a50bf36ea1c214d3dea0028161acec492017939837917d5e50870fb8931b878896cb88457694c289b2ec09dd0cb3f3778401d8890b37f6b945617f400065968f800e28610d6c1afea3a515bc12886291d8c68b7c190fc091ce85652dffb37ad589f689a19ee1388fa5197ed81af61c96"], 0xac}}, 0x0) syz_init_net_socket$llc(0x1a, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000002c0)={0x0, 0xffffffffffffffb7}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0x68, &(0x7f0000000340)=[@in={0x2, 0x4e22}, @in={0x2, 0x4e23, @rand_addr=0x8}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e23, 0x8bce, @empty, 0xffffffff}, @in6={0xa, 0x4e22, 0x8, @mcast1, 0x3}]}, &(0x7f0000000400)=0x10) 22:38:53 executing program 2: r0 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x9, 0x40) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) write$sndseq(r0, &(0x7f0000000340)=[{0x1, 0xfffffffffffffc00, 0x5, 0x80000001, @time={0x0, 0x989680}, {0x101, 0x8}, {0x1, 0x2}, @note={0x7, 0x6, 0x7fff, 0x80000001, 0x1}}, {0x4, 0x1800000000000, 0x400, 0xd3, @time={r1, r2+10000000}, {0x7fffffff, 0x8b}, {0x0, 0x3}, @note={0x1, 0x37, 0x0, 0x6, 0x3}}, {0xd00, 0x9, 0x4, 0x1, @time={0x0, 0x989680}, {0x8, 0x8}, {0x2, 0x3}, @ext={0x6f, &(0x7f0000000200)="e57626306a81bbed947163e898578a534ebbf1fb1752def47bb80fc7e43aaa46ededf280912859b77938e36b04f20c352211d3367df8730c8f763c141a16ace590fcbec75e3ca6bc9bae15ae4089aac9eaa626315403e6cff048ea24d8fc54999b77c4406a53f47f6b4db57ce9a5bb"}}, {0xfffffffffffff001, 0x8, 0x0, 0x101, @time={r3, r4+30000000}, {0x80e, 0xff}, {0x1, 0xf0d}, @addr={0x400, 0x3}}, {0x4, 0x7ff, 0x4, 0x4, @tick=0x401, {0x0, 0x4}, {0x9, 0x5}, @raw8={"c1ed237a63b5329fdf4f1472"}}, {0x80000000, 0x10000, 0x3f, 0x1, @tick, {0x10000, 0xff}, {0x9, 0x8}, @raw8={"f11a89be6a940bc37fa46af7"}}], 0x120) r5 = dup(r0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f0000000280)={@remote, 0x39}) ioctl$PPPIOCSMRU(r5, 0x40047452, &(0x7f0000000000)=0x1) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) ioctl$ASHMEM_GET_PIN_STATUS(r5, 0x7709, 0x0) r7 = accept$alg(r6, 0x0, 0x0) recvmsg(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:53 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0xeffdffff00000000) 22:38:53 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000240)={{0x25, 0x8, 0x0, 0x1f}, 'syz0\x00', 0x4c}) futex(&(0x7f00000002c0)=0x2, 0x1, 0x1, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f0000000340)=0x2, 0x1) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '{{eth1\x00'}, &(0x7f0000000140)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x7a, 0x1) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:38:53 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={&(0x7f0000000140), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=@migrate={0xac, 0x21, 0x9, 0x0, 0x0, {{@in=@broadcast, @in=@remote}}, [@migrate={0x5c, 0x11, [{@in=@local, @in6=@mcast1}, {@in=@local, @in6}]}]}, 0xffffffffffffff6c}}, 0x0) 22:38:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socket$pppoe(0x18, 0x1, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:54 executing program 6: r0 = epoll_create1(0x80000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x40000002}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="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", 0xfff7) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:54 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=@migrate={0xac, 0x21, 0x9, 0x0, 0x0, {{@in=@broadcast, @in=@remote}}, [@migrate={0x5c, 0x11, [{@in=@local, @in6=@mcast1}, {@in=@local, @in6}]}]}, 0xac}}, 0x0) 22:38:54 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) ioprio_get$uid(0x3, r1) 22:38:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x7000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:54 executing program 5: r0 = socket$inet6(0xa, 0x20000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x2e11}, 0x8) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) accept4(r0, &(0x7f00000000c0)=@alg, &(0x7f0000000000)=0x80, 0x0) 22:38:54 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x3a5) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000600)="ab4f3fec94248c32e27d0400000028ff0f0000a8010a7b8248291938fba7d4a9e48334dd02067f9f4ab6edfcbc62231d9b9d4ade95ae4a4b25ebe5dc85085c1e95180b0d3ec9fcc7428f943ffb00d80cc6862dbf65912dddd080bc832828864e44e66a1866a4e3c74654b8f887a6e10c254212643180d26845f62a52402e7225a921a020a2343db8baca189fe99e45e5b4bbdcd71996bd8d106a095a728eb231df2f85e3590000000000000000000083b9a065c9a5a8175707ab13678e129d3ce520b4c06de81b2b3f83be73af4b996172f4dec8c581b5", 0xfffffffffffffecb) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x101000) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000080)={'ipddp0\x00', 0x200}) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001300), &(0x7f00000011c0), &(0x7f0000000280)) socket$vsock_stream(0x28, 0x1, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 22:38:54 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) r1 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001600)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getpid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000017c0)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) r6 = getegid() r7 = getpid() r8 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001900)={0x0, 0x0, 0x0}, &(0x7f0000001940)=0xc) sendmsg$unix(r0, &(0x7f0000001a40)={&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000280)="08d31c4a1c4903c64872a043cef34c514978ce83af0bc683cf4ea815180b88e052bfeee2fec82a86fbf2229debece912c27c32f0ca496465d086d13c68336c8b0614941de70dc800b3efe173cefbcf1994995faefd074325c22f4b3c06737c51d0d66e50ca417de81889763454cc5283916194a96cd54a70184cf9c1ecfe622b2ad01f6a918b177740797ce9322d847ce37698e4e9250f2aa7d48261d3b2e042f100b1", 0xa3}, {&(0x7f0000000600)="b407a7cf162cf67dc111337a45eac2d45c12074a8f2c2d3f9d1cf558ac5c6c161eeeb2a5dc3173af9c913ecaccaad0b7e14ed025b04f3773b2a7edea09cc6c3744417a28b36713f6a478c134f7f49c7addf302a61f006b39ad45c105ce4da76399277dff871fcf755d8e299614093e5bef8081bebb7e30b90a076668f55d5e7f6ed224c0750a43c42eb9c969fd88d98825f97f89e1c112e6d511c20f1715ce688f8acfb9c5053c8a1eb05631c258647c145e8eba8ec6e0b038ba5f89c07913a832401300004cc286eb5ea7f4cdebd520e8b90ab4086b2ce9d6a7cbbbe3ab8aff48b2f1cd366a2749635e6be1ab3ad03fbb86ae27bf6d1fca12e30867f892ad20cea9a21782d154a16d756c453b36ffb945a4ea916bfb14a5dc7c3bf5676865268a8eb1e799a39e7fef12e338e13d9b9eab04bca3509d9f95e0e4fd9fa55cc4d41ede630e0f5cd8da1dd07a4095c13f95dd773bb9f687d9379c7b6adbbdb65e3185a173a6111669a8cbb955b4565c5036f7b08ecca2932a815229e63d9c4622d93d5a24532db6fc1a3613fcc3efb77b6f8f16ca9e3ffa4bd4ed0a266ab7bc74d072793a8b79615f90c3a035c8c98dbc755467b73810027f5fb0c1b82a4d0c74ad80daa6005ad195d3fd8903d85743291e6eb51061a81565cd0ecbb166e3b0ea9e4b6fb4fcd6a65618d3e86947eed475d364ae82779f73d35bb5ef658075c822de07bc399e08323b1a992b78a2c7a790b563f36bd162bfd8c81ebf4642b38b0040362dbc73089f50e0f8600e9d8911d53a71faa7fde05b8f9ce21a3db4574bce27b62244351f3acfcd195cc873378a46e9e449863890712f8bbb60c27bf120bff39c844751e6ec059b49d0f6afc6808bbb448deb02d33e5607c4c0120211c2736f24a9556bfd1542c71290f4b2e76dfe03280e80d4a36529afc223fe05905beebfb00a3f7d0552f0ef4dae3e1e5e543752c47520598ce59a0cd585a5041571f1559dd2663f58df77ddeeda58cc338c68632e0199627e8b8b9fdb63f2f936b6c397f09375866cecda9387d735afefbc381097cbf896bee88c2c2995f8805dbc3c055d3467487ddcfdf20b0b2028d8d945363c9676c864e9e374d5f9b4381bda4fc2f577f46c1d2445c326c5b3142e89abe9fa41e2c5df34882687c31bf14814111ded62c7dd6808a4f3fb4efbe8ee288b8aad654a04a33e04e1b122c4c006e5aa149286610809e4139d0027a5fdb1f1da05978716b24dfb92e11885c55d182ba6154af57484a571be4619a8f8f43fad611f73e04ca6099dab23ac102f990fac421ce18b1c90317b3f46803c6493c6cff1cc37ecc43505df8a8d6bb78afbd4bd86bcf3371b3170f68d66c62a39fb6066a8e8052c9e09d28260ca07d518f4135566a5be5255c6187ba6c1b3d727e1b1b12552aeba31b480b7c0c79dae41ed6b638dab89d25672f71d784fcc5f5ec20d1932916c156c774afd3caeb4c3366e344c87c511e396d199fabce0fed9d10c7c44f8be7805d99d8283f2538fd82b97c41927f658af3db86b354c5c0ff10b0ac6bee775cc6fda67503c635ae361ce71b011069346e7035337de599d0c29c48b68969b0d08fe57c3c7e1ad315c46695889b231113354fb1f529edb8a4126224e6fed66170ff1f355df350ea060565c503f0ed41741b8166be0d86ac480748467235596266667c4ad026006faa742b756b486c38e507f3eaa220a7ad35d6167507b6079ca49df39ef70c7fd5226d92d4bbed3d5cd915b989c1f154a735bfb88006211588eb33e27f82c412b68e5b2ddb83d9f71d65ded38370771a60d75dccca041a2b65120aa2ce358922a4dd471637433ff6fd063d354c457c2da2a890c906afb9cafb5c7ab45155c259a9844f0d307c33fdce951ee8b45895c177a2bc5871b53fc29bfc15145fba1f76176f2077169c602c345aa34b757434e2e6e660389a64af6474329bdaf683c1b532e96c161df65b7599185fc6b75e80ca5d3f7105a98e2349c2c52151ada53dac4634e5c186b62800b537ad7cf5c5d84280aee5c3e4b79cb98827c8cbdb9aae4ba1ce744358a4dcd6929acc770cd9215fe06214c4069478f8b5b1567328ba5b5eb935822bf7f7c2275c3c0be63de602e0d17fa1ecd6cf81ff349adde02a13aca38f6838b9497aca42e3a1ad0cf58746b88aba54946a3882e6ba9c321233e1691ff11c5ffd8a15ec85faa883cdb9cdae5f9f0780e6dc4dadce774fc01dc2647b88ce100a101a4bf61426d081d725d9003e74d6f6cd284b9e9928aa383a20cfd4a23b5296db2f27ee0a7b29118c33d1919472ed550c97f82f9932f5a16ab025480fde2329c72bdf2d1bc5926c08e4962f9fb510768cedd235e76d1975e9aedf8db6035ab23a81eb1092bf5db90cd850fa037d4545a67de294af6d7c3553e2098c1de0b6cbdceef5c805fdf6980dff4980382c745abd09d21e8db7228038b37af3f475b4d8ba5c91c78a0bfb01086842a813f2cb97b712e6de33a85b5b31443136fcf6e6d566f0d7acc363402c449e27aa48eb86a08f2b8ec42cb95a2de7dd1b97a662fed5da0fa2a4bbdbc2801cc464891645c722d505402d792a989c12b4b63d7381fc9a5592b98b0a979d0949efb3c912be8dc89a163b518eff6ac30159e9fbc6ccd004c250f242bbfef77dcbaaa7ea3589891f50df3953532c75dbdfc1cd043671ba038c4fd7ff1c9f702afda03c52faa86eec2066d5aa28784056bd5eb6ffc914041db70921d0047c7bf23a4234a0f568cfa333efb1bdac8ed46218c6e7d711729dbc6c32de1ec8fa00b7bac826fc62f440ff56318e6a4c3889c19e81c0feb321989a78b36557a7a606f9379744454123f6ca72487feb8a5f3d4caeada5feee48e89d2e6d4ae7937b55c840f71c73c79bdcbaca2e8d8134fb3c1c07df4c634c076fca0924086566b775d12ac0fe7b781887c2dc6e789b6a7d2245a8d71fb3325bd7f31adcd76779a5267eda08c7a70ee323e9712524b8bfa5657d236d8c57487af7371204d08e45309c67b8889092767111746f0ad3d90d483109b1ad13b7db51e9869976bbbf5dfba03385ad601c934e02a0dfd9fd96666c5f8dfd521bb5110ab27ef66c6ce9c1090a177c966ee564a01ac135f297baf8aeb4a622fa16e6dc57ff9ac26bddcc28d59060a5fa588c49fec79a5464626751ceab6b77d01026ca861e181b356eaa2fee9482a624b150b3c3a815785af94cb4c11be09817150a58abe6214c6d6902aad8183a24ffa7b96c239e8f0b10f1ea451fa0a9ba5a833a648e57b999cfe6937f3b934a0b415f748fb0621cd3db42961c9947be84a5b4e2f13ce1421f7e2602a7557e3abdeb7f33b60df38f0601ab0b1fc4f067c31b4fb49df5c89ada48c1f82c0fd1aa0b5b07c542cf2b7662a0d90d37af6e8434d41047057546eb7401af9fa4cfc84dce16362a0d9284be8bd99434e9e687b2f84bdae39e9fe868339954f82df375a96db12b3e73aed34c9531cdfbe92bcc0b71568225a234a4ed12383543b9f02c8050cae44c606567507a0bbf20e8aea1703262fe9f0df3f253ea3c538f06c1e9991bb4230adf39724e7ef0ef9722603551e15d148a74b7e15f2e9a2afdc920c34632dcb81a63184f1a010e1b15917f4a21011cd6c92bf9effac1e92fcae455d76b61e146e63eb58dbdeb282a22cc08fd21cbcc4002a6184adad03932fa3c23827f45d8fb0616e807638a8f59b051d4921cd853da5d8c9eab11ec50e94e86659d416eef9f17507aa092b967ca06e3581bd98957be43dca29934aa6b064fc4bd709945335f985f8d382359ecad0a0cd7156114edd97875e595af8b63411dda106561cbbff2e9d6c279598d584204ad9360a916fa0863b97ad5f55175c0132c8593849401f90896c3b903f7f611329beb09de2d6482bfae49ec00c735cb0d1c98e2371d928f91dd0094d22dd7c2c9fb565fe6fb3769441591b878aaebeaa0903c77a1f84042793a9f892741b645239c7dd6e64049b3846252a31175eeda43fb21efe01b599910b7f394445f245081898fb14f4b8218117c4ccd98e359d25a11609ba3468d2cf3d64e3dc325d975e7bb48142a866ad343a20d1943c0f391f4986a1eb71c801d36811b1da622ee4b3e5e370f479be219f395b8243a62affb49327692272ad8cc4e044ecf6d0fecf112d90c7bf53efa2640d530cf47918fef446f8b01c35c84218f766964aba1367e60e2da78287d0b6480dfaf5d53925f506e048f4d7bf41ebf5b32d4e138963a72f7b29b09d868a458fe7dedaf2d15a785b6025428c7f4639e9052230877ea6b6aa4f3a45bda82f8862e21b568d87b72dff0bd610fcd981665ece2f8ee4daa78d7c3dc6c37e9087a75f4bddf8cab5f870a0f23c90e27b1249623f9d9a32d1d350fc2e29c92125319e89704ba577e70b2b357537318dd037e9ce74aee9b4c99d2e0f4ca46c27d006b17a1bbc79d5c6d50c74f188e9e46f74e85365bf1172a51ec092373d28b1fc3e34949307105ef9f52a92f8425927138e2d848a913661f529cd2c7423fa86df36aeb72664f19afa642d73d466b8bc1ce3a003d38dc9459d6fb403128f1a7ea1726e1ae1e218b50fc9a74f4c6701be7080c12c4fb803216cb6c5633c62058c6c3b2629c0dcc199ba39c8a47b523245f0bb84ca88ba6110909b2b1929d17c53db5cddc1475e7c283db3b7944c55916178a85e25ce09b1ee630bd877d942e1a16b7a07a1f57c8ee3fb36a8c04596fe0cbfaf1831cb866e374a160c995ea2d973b9c43d4346dd5da7a52e8422c5bc4d3bfb4d2bbc597a98c7556437caebda35a14047cc2a288f35736287473712141f8bacd52e4423144eeef12b27463bcff64de80bad2f7990f029d092c2ff45553c2a6796d04014cd4b56513efe432bf4574ddf340f4449576bc596934e6e437edd2eefb106ec1b0a4124f791c2a92855a96022c917db23a4210655d68efd8ab37b8b46a346d72b93bd7be3f37c8d32bc5c7b7c9120fb87d2fbaa4b6b6a598ba684783af900066dadd392988a4bf634421286359220911e95afdb288f907111d9eeb11c1d74d528dea8373ca599c6c1f4d718312ff16c1fc4dfea145812b9bfce1aa0e3576fbacf448f1747a36623e9f6338597043fff0fa5794092c3726cbfa02e59b9f2ad43667665db4e5cd9d35d0a7af66a83af0dd8b0081f7f826343a1fcd60f22a7a59b59b674101aef0485fdd693b01354347a221bde04e762cb1982ccb1725f316deccc14c3c2fd208ef0290f77625c0620418bb94432627c73737a5d812785c90384f3320b3562c4a29b13afa5ae35a02b22a895df07f90406b331113918d40a1d7d9a3516c7241569c53bb36578ca7b37dade3cf1b6710e8674d08ce46f09aa15aa8dbd33f1d31898de7c852d63afe9b0266b5f47cdf6c6fd1f5decfe2f69d596f31ee7db4c4adc92a2012b588f248b3755b74093b700e4f4e52dc3b24799f35b402423e54ba0d9bc4f1bc55b87db09812f9790de49510f47e2751c3b24401ccfc7b971b509dcbddc9c3e3bf40ab596b3f4a1e39fa38f06f02528ee6bf39fc8a97e17899f6b2b58fa3d85829d42892a489b17e89a6f46c2b0491cfce3535f2b85ff009053281bf3fc29bc5c3f6b369d74b4ca2abc68f0814353ad774a73af87c27abb2481999799465f4eb0fec26e51f32b1428a56dbcaafcb5af323b528363e44f36f683d132214b4182285f2123823a960e8b5fe659e615ae1b78ddcc0e9abb4ba72a9242f56f51b16927dac4a319ee5e02f983c9842286db5c5ab4", 0x1000}, {&(0x7f0000000040)="b5d5cc31ac833f5fb86f2674064d21f981b0b998", 0x14}, {&(0x7f0000000340)="3023d8da1c567cb79e336b6262e874bb77ab7d7127a2893f2fd8b9eee21320ce30b70a3348f5a03e9581dc0feedd6b2276d39c067b2487a270b761aeed5c684cde986d2eee762ced11272a6bdbd34a1adb4828ccb219ff079d229034c942f674b3c43e11ba0ba0238199f8e418dfa700e112ade69a4050817b589e2a95a579d1e5ec8d60bbcaeab6f85de3e0db2b2f060ac4c955a05e286eb4f75f959a2ac444001cfadce85b25bf206914ec4de18839c05dc12ff98c42e34ea6b7dd066a15fb6a33fd3bce0e349abf53916e06aad14d5c07e8d73ebd93da3ad22fdc4604ec5df4be69e3cc0fea4f5f8da69de290", 0xee}, {&(0x7f0000000440)="e58e27bd9a8a0208e9bd40d77d6110b37d43656ca137ae1e222c16fe4befaf0812458c9e15d0bbf482196a46419e", 0x2e}], 0x5, &(0x7f0000001980)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}], 0xa8, 0x10}, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000001a80)=[@in={0x2, 0x4e23}, @in={0x2, 0x4e24, @rand_addr=0xffffffffffffffe0}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}], 0x30) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r11 = accept$alg(r10, 0x0, 0x0) recvmsg(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:54 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:54 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) bind$bt_sco(r0, &(0x7f0000000040)={0x1f, {0x7fff, 0x9f33, 0x4, 0x1, 0x3, 0x400}}, 0x8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:38:54 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = semget$private(0x0, 0x0, 0x208) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) r5 = getegid() semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f00000002c0)={{0x894, r2, r3, r4, r5, 0x44, 0x7}, 0xcf07, 0x0, 0x7fff}) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r6 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r6, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0xfffffd45}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:54 executing program 5: socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95)=0x2, 0xffffffffffffffab) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x30, &(0x7f0000000940)=ANY=[], 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) close(r1) socket$packet(0x11, 0x3, 0x300) close(r0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3) mq_open(&(0x7f0000000000)='selinux\x00', 0x0, 0x0, &(0x7f0000000040)) 22:38:54 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="ddf5e639722a2dccfc054e97ce99a1856d7e34b3cb", 0x15}, {&(0x7f0000000040)="fca4c35e7bf05c0be653ff691cb90858", 0x10}], 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$int_out(r0, 0x5462, &(0x7f0000000140)) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$setregset(0x10, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 22:38:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x100000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:54 executing program 6: socket$alg(0x26, 0x5, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) 22:38:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) pread64(r0, &(0x7f0000000600)=""/4096, 0x1000, 0x2e) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:54 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) ioctl$KDMKTONE(r0, 0x4b30, 0x3) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:38:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = semget$private(0x0, 0x0, 0x208) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) r5 = getegid() semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f00000002c0)={{0x894, r2, r3, r4, r5, 0x44, 0x7}, 0xcf07, 0x0, 0x7fff}) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r6 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r6, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x100000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:55 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000180), 0x1c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') r1 = shmget$private(0x0, 0x3000, 0x78000010, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) process_vm_readv(0x0, &(0x7f0000001100), 0x0, &(0x7f0000001340)=[{&(0x7f0000001140)=""/204, 0xb2}, {&(0x7f0000001240)=""/148, 0x94}], 0x2, 0x0) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x4000000000001b1, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x505042, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) 22:38:55 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dsp\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000740)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x3f, 0x7, 0x10001, 0x12, 0xa2}, &(0x7f0000000800)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000840)={r2}, 0x8) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) preadv(r3, &(0x7f0000000500)=[{&(0x7f0000000000)=""/98, 0x62}, {&(0x7f0000000200)=""/45, 0x2d}, {&(0x7f0000000240)=""/144, 0x90}, {&(0x7f0000000300)=""/75, 0x4b}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, 0x0) 22:38:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r1, &(0x7f0000000080)="f8cca0c009f823a08f51ec542fc81f8eff811b73b8d6555c0a16ca0643ac72b3824dfcdc525bb02338b55d4d5d0d860a13b0f62ca9a7021e8b1e6a484af1e9c4188a19775360f3597f4e779542c12cdb42d309396c47d6cb0a95e44297a74f9fd601a47bd156195d5ef37f7935ea90729757fd936c68abb2f4633b8840ff9f046b53004dafe5db10c20412fe4da1a8ab136047b941ed15", 0x97) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x30, &(0x7f0000000140)=[@in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e24, @remote}]}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000280)={r2, @in={{0x2, 0x4e20}}}, 0x84) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x40d423d3}) 22:38:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000200)) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0xc90, 0x3, &(0x7f00000004c0)=[{&(0x7f00000002c0)="58f91fc0c983cdbdfda9db990905e7cb34c4edf8d5b4e459ed2b234514c24d52391c1ad1b7a0cbe5d11c96f9edabccd8a61abddd67087d96673e9db26920a3987df4ae6ad044028d7a00412fca8fab365e0a2d69a84b9c78ebede1a4c15b5869a32aa3beebf1e2e145fdb43da370673671fe0833eb9aad24bdfde95630d35cae87a2ef6aed23563d2e16d29ecfb33a44f7d9acbf8469afb014fc432aa8fa226f5015e3d95db524645622d3126c58dd24ab9e4ad099f84d67e75a33", 0xbb, 0x8}, {&(0x7f0000000380)="80a5f245b8eed84200aadd74a4099ebe8169b549126cfd597ad26044da4ea7fe3d4e2fde87d871c68c41f69d16d5ad640eaa1821a154875ac4406043c10564df8a7318377cfed40ebdfc012b8a5ca148096f97a7d0ab7cdbde14572a20e37196aa5b3dd79b6533797912eaf902e9f4472a01d16e88f76d7b161c0912cef36657cbd7dcd4c436f8bc6f", 0x89, 0x200}, {&(0x7f0000000600)="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", 0x1000, 0x1}], 0x80000, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f71756f74612c646973636172642c6e6f6c61726765696f2c73776964747a0b000000000000303030faffffff30386437642c6e6f646973636172642c00"]) accept$alg(r0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x680180, 0x0) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:55 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:55 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) munmap(&(0x7f0000001000/0x6000)=nil, 0x6000) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) bind$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @hyper}, 0x10) unlink(&(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000240)={0x1000, 0x100000000000000, 0x7, 'queue0\x00', 0x1}) fallocate(r0, 0x20, 0x8, 0x4) 22:38:55 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:55 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) connect$netlink(r0, &(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f00000004c0)=@expire={0xf8, 0x18, 0x1, 0x0, 0x0, {{{@in6, @in6=@dev}, {@in6=@remote}, @in6=@ipv4={[], [], @broadcast}}}}, 0xf8}, 0x8}, 0x0) 22:38:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-avx\x00'}, 0x3d5) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = getpgid(0x0) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x7, 0x1, 0x100000000, 0x40, 0x1, 0xfffffffffffffff8, 0x936}, 0x0) r2 = accept$alg(r0, 0x0, 0x0) r3 = socket$inet(0x2, 0x80006, 0x7) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000280)) recvmsg(r2, &(0x7f00000000c0)={0x0, 0xffffffffffffff4b, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b, 0xfffffffffffffffc}, 0x0) 22:38:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000f7a000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0xf2df) write(r0, &(0x7f00000000c0)="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", 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r3, r2, &(0x7f0000f28ff8), 0x100000002) r4 = getpgid(0x0) tkill(r4, 0x13) [ 1668.495639] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1668.517637] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 22:38:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x7000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:55 executing program 4: r0 = memfd_create(&(0x7f0000000240)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcda379c73087d7457d72ec23678afe537a4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b8282d8469d5548dfab54ba6cb3f01f16a417d9dbbf79062d7b83c970fbd33d10d363815b09ec1d2c3c85ea1fc8bb62ec4996891d96e4382abb4af6e2e64d423c219462625e7eeb87e2a50eae1dc8273a7e6a8e45faa", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') fdatasync(r0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x80000000060, 0x80) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000140)={{0x2e, @empty, 0x4e22, 0x1, 'fo\x00', 0x8, 0x1000, 0x37}, {@broadcast, 0x4e22, 0x2, 0x8000000, 0xc5, 0xffffffffffffffcb}}, 0x44) unlink(&(0x7f0000000100)='./file0\x00') 22:38:55 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1ff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes-aesni)\x00'}, 0x58) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="d3ab27191a01002356ba602dff05000b", 0x10) r5 = accept4(r3, 0x0, &(0x7f00000000c0), 0x0) recvfrom(r5, &(0x7f00000001c0)=""/241, 0xf1, 0x0, &(0x7f0000000040)=@nfc, 0x80) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000200)={0x0, r6}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000180)) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)=0x0) fcntl$lock(r0, 0x7, &(0x7f0000000200)={0x0, 0x3, 0x4, 0x3289, r1}) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x300, 0xc0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000500)={0x52, 0x40, 0x9, {0xffffffffffff8001, 0x4}, {0x1, 0x7}, @rumble={0x4, 0x8}}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x400002, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r4, 0x111, 0x2, 0x1, 0x4) getpeername(r4, &(0x7f0000000340)=@hci={0x1f, 0x0}, &(0x7f00000003c0)=0x80) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={@dev={0xfe, 0x80, [], 0xb}, 0x200000005b, r5}) getsockopt$inet_mreq(r4, 0x0, 0x23, &(0x7f0000000580)={@multicast2, @multicast2}, &(0x7f00000005c0)=0x8) r6 = socket(0x15, 0x80005, 0x0) getsockopt(r6, 0x200000000114, 0x2710, &(0x7f00000000c0)=""/1, &(0x7f0000000000)=0x1400) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x4, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000000480)={&(0x7f0000000300), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r2, 0x102, 0x70bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x90}, 0x4000) ioctl$ASHMEM_GET_PROT_MASK(r7, 0x7706, &(0x7f0000000600)) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000540)='bpq0\x00', 0x10) ioctl$LOOP_SET_FD(r7, 0x4c00, r6) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000080)='./file0\x00', r4}, 0x10) 22:38:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = memfd_create(&(0x7f00005c5ff3)='/dev/net/tun\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x802) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x7ad7, 0x6}, {0x3, 0x100000001}, 0x267, 0x4, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f00000000c0)={0x0, 0x800, 0x207}) dup2(r2, r2) write$sndseq(r1, &(0x7f0000000e50), 0x32e) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) 22:38:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) seccomp(0x1, 0x1, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x31f348, 0x7, 0x3, 0x5}, {0xffff, 0x7fff, 0x406, 0x1}, {0x100, 0x7, 0x0, 0x2}, {0x8, 0x2, 0x5, 0x8000}, {0xd5b, 0x0, 0x100000000, 0x3}]}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x1000000000000a, 0x80000000001, 0x0) getpeername$packet(r2, &(0x7f00000007c0), &(0x7f0000000800)=0x14) getpeername$packet(r2, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000880)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001bc0)={0x0, @dev, @broadcast}, &(0x7f0000001c00)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={"62005f0028e0ba7707f1f3adb44900", r3}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x0) gettid() 22:38:56 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab4f3fec94248c32e27d04000000288a", 0xffffffffffffffa1) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:56 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:56 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x24, 0x800) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) fcntl$setpipe(r0, 0x407, 0x7) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) r1 = gettid() ptrace(0x11, r1) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 22:38:56 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) read(r0, &(0x7f0000000200)=""/99, 0x63) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x1, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x100, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x20000000}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14, 0x80800) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14, 0x0) recvmmsg(r0, &(0x7f0000002480)=[{{&(0x7f00000002c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000340)=""/179, 0xb3}, {&(0x7f0000000400)=""/141, 0x8d}, {&(0x7f00000004c0)=""/243, 0xf3}, {&(0x7f00000005c0)=""/131, 0x83}, {&(0x7f0000000680)=""/203, 0xcb}], 0x5, &(0x7f0000000800)=""/233, 0xe9, 0x9}, 0x38}, {{&(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000980)=""/232, 0xe8}], 0x1, &(0x7f0000000ac0)=""/79, 0x4f, 0xffffffffffffffc1}, 0x4}, {{&(0x7f0000000b40)=@ll, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000bc0)=""/29, 0x1d}, {&(0x7f0000000c00)=""/54, 0x36}, {&(0x7f0000000c40)=""/246, 0xf6}], 0x3, &(0x7f0000000d80)=""/180, 0xb4, 0x1}}, {{&(0x7f0000000e40)=@generic, 0x80, &(0x7f0000001140)=[{&(0x7f0000000ec0)=""/214, 0xd6}, {&(0x7f0000000fc0)=""/55, 0x37}, {&(0x7f0000001000)=""/234, 0xea}, {&(0x7f0000001100)=""/9, 0x9}], 0x4, &(0x7f0000001180)=""/82, 0x52, 0x3}, 0x864}, {{&(0x7f0000001200)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001280)=""/7, 0x7}, {&(0x7f00000012c0)=""/5, 0x5}, {&(0x7f0000001300)=""/93, 0x5d}, {&(0x7f0000001380)=""/111, 0x6f}, {&(0x7f0000001400)=""/220, 0xdc}], 0x5, &(0x7f0000001580)=""/64, 0x40, 0x877}, 0x4}, {{&(0x7f00000015c0)=@rc, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001640)=""/231, 0xe7}, {&(0x7f0000001740)=""/236, 0xec}, {&(0x7f0000001840)=""/139, 0x8b}, {&(0x7f0000001900)=""/217, 0xd9}], 0x4, &(0x7f0000001a40)=""/253, 0xfd, 0x1000}}, {{&(0x7f0000001b40)=@nfc_llcp, 0x80, &(0x7f0000001bc0), 0x0, &(0x7f0000001c00)=""/230, 0xe6, 0x1}, 0x1000}, {{&(0x7f0000001d00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001d80)}], 0x1, &(0x7f0000001e00)=""/247, 0xf7, 0x1}, 0x4}, {{&(0x7f0000001f00)=@rc, 0x80, &(0x7f0000002100)=[{&(0x7f0000001f80)=""/205, 0xcd}, {&(0x7f0000002080)=""/32, 0x20}, {&(0x7f00000020c0)=""/15, 0xf}], 0x3, &(0x7f0000002140)=""/128, 0x80, 0x1ff}}, {{&(0x7f00000021c0)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000002340)=[{&(0x7f0000002240)=""/63, 0x3f}, {&(0x7f0000002280)=""/154, 0x9a}], 0x2, &(0x7f0000002380)=""/242, 0xf2, 0x7fff}, 0x600000}], 0xa, 0x2002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000002b40)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002bc0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002c40)=0x14, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002c80)={'\x00', 0x0}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002e40)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000003080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000030c0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000003100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003140)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000003180)={@remote, @local, 0x0}, &(0x7f00000031c0)=0xc) accept4$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003300)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000003340)={'vcan0\x00', 0x0}) getsockname(r0, &(0x7f00000033c0)=@ll={0x11, 0x0, 0x0}, &(0x7f0000003440)=0x80) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000003600)={@rand_addr, @multicast2, 0x0}, &(0x7f0000003640)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000003940)={@multicast2, @multicast2, 0x0}, &(0x7f0000003980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000039c0)={{{@in=@rand_addr, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000003ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003b00)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003b40)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000003c40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000003c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003cc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003d00)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f00000045c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000004580)={&(0x7f0000003d40)=ANY=[@ANYBLOB='\b\b\x00\x00', @ANYRES16=r3, @ANYBLOB="10002abd7000fddbdf250200000008000100", @ANYRES32=r4, @ANYBLOB="7c00020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000300000008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000100008008000100", @ANYRES32=r6, @ANYBLOB="340102003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r7, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400aea600003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000200000008000600", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="dc01020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000900000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000200000008000600", @ANYRES32=r11, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r12, @ANYBLOB="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", @ANYRES32=r13, @ANYBLOB="740002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r14, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000000000008000100", @ANYRES32=r15, @ANYBLOB="bc00020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040008000000080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r16, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f636f754b15be6b876e740000000000000000000000000000080003000300000008000400ffff00", @ANYRES32=r17, @ANYBLOB="9401020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000600000008000600", @ANYRES32=r18, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004007f00000008000600", @ANYRES32=r19, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r20, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400faffffff54000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000024000400030008060100000040000301060000000400000033f6ffff070007040900000008000100", @ANYRES32=r21, @ANYBLOB="3c00020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400ff03000008000100", @ANYRES32=r22, @ANYBLOB="2801020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000800000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r23, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400050000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r24], 0x808}, 0x1, 0x0, 0x0, 0x4044800}, 0x10) 22:38:56 executing program 5: r0 = socket(0x1e, 0x1000000000005, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x8000) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000080)=""/228) getsockname$netlink(r0, &(0x7f00000001c0), &(0x7f0000000200)=0xc) set_mempolicy(0x0, &(0x7f0000000240)=0x800, 0x401) r2 = semget(0x2, 0x2, 0x8) openat$cgroup_ro(r1, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) semctl$SETVAL(r2, 0x0, 0x10, &(0x7f0000000180)=0x4) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 22:38:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80001, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:56 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="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", 0xffffffffffffff2e) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:56 executing program 5: r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e20, @remote}}, 0x4, 0x9, 0x2, "c1c2bf0211b20c29c8711119c48b3e2341d2c5f4117d579b104661b47f88e7567217877b51b94cf00361c8b4859fd6e20c315e9954f804b702990de5f718825b3745c9a52ba2fe0235f955573f979b88"}, 0xd8) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x16, &(0x7f0000000380)={@loopback, @local}, 0x8) modify_ldt$read(0x0, &(0x7f0000000000)=""/225, 0xe1) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f00000003c0)) connect$pppoe(r0, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="6396bc827980", 'team_slave_0\x00'}}, 0x1e) 22:38:56 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:38:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x2000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:57 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x0, 0x4) semctl$SEM_INFO(r1, 0x2, 0x13, &(0x7f00000003c0)=""/4096) socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000005a001f01000000f9002604000a04f5fe07000100220100020000039001c9a8005b03d1e1ff7047d76555e0b155a8c8e95d27b7ab0db03be0a48b26ac53dfc930258e43822aff03ff0d587df1b2e8ff4ef941f08bcfdaf3f3c2842d9c8370d52a8465fddbe6c883ca3abe874c8d6e616b4dbbcc5cbbdf7afdda726404fbad12ab4bf2ca0efd0d7a482aed03aeaaec48fc0a60e8c91276677b3c4d9900ac6c32d9d5072e2719386eaef1fced9b24ee029f466dd338abee6b511e58faa0482838dbf354c05c", 0xc8) 22:38:57 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x80) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000000040)={0x4, 0x101, 0x6}) 22:38:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000001c0)) close(r1) socket$inet(0x2, 0x8000a, 0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x700000000000}]) socketpair(0x9, 0x803, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x20, 0x3, 0x4) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RMKNOD(r3, &(0x7f0000000040)={0xfffffffffffffd2f, 0x13, 0x2, {0x80, 0x3, 0x2}}, 0x14) 22:38:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab4f3fec94248c32e27d04000000288a", 0xfffffe55) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:57 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:57 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000000)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)="d32d0b2326af72f30c6ca5042dd3f5e4ce743b32869ad519552ec84c39b15e11ef9036a7af192d43a90c", 0x2a}, {&(0x7f0000000240)="3073082cf3255af7ad42fba680a195dfe47568c91cc4b18c3390d612e4a81128b9a41da21cff8819f8861cffda1cc4ca356bc0bea0454a0d558317a242de8986b0f80161f6def048f36d3c0c4b8915638c62686efa4acc4dd9a79be14e32bc471d4c88b7c0295550ca33e8ed58f1cb82b985bd922b91ed5c7fbbc96c0283deaafb85eff83a50d55b71167241c2680e672f5f02a8bb", 0x95}, {&(0x7f0000000300)="e680df688694459f1fa47b9ea3bc864e11bf793faabc02d6415b1fc0251d3212d8fdf07b7c8f10583b7ec8d445e0a599f3fceb7c503d7af41a6243aea85a45beb947fdf3daf5e4", 0x47}, {&(0x7f0000000380)="6fdbd6168efb413e9249991c4eeadfd668722482e4edcac21b3526b055ae43d31446e8ca449efdca216d5315c1450de303c8857dc60d5a340d0a8b5c0e9b11276514611017f7d2fb25f5408995555033f6cc118b94f4192002484ca9cfdb85993b734766f6eed5ee0189c71010149fb931b8de3377bf30482978fbdb9445701d1899eabdb7acd50262643183f8de5ee42f58801cb0c804838200e157b134e014a62d65253d46220d75b09f846013cef844be536c451e245dab610de59a2a1d12fd2181090fc731dde06307e39eea63c52582e3f8022b43e1bb09596845b7e415", 0xe0}], 0x4, 0x0, 0x0, 0x80}, 0x20000800) 22:38:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x168) accept4$alg(r0, 0x0, 0x0, 0x80000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:57 executing program 6: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x400000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e24, @loopback}}, 0x7c, 0x80}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={r1, @in6={{0xa, 0x4e21, 0x9, @empty, 0xac54}}, 0xef, 0x4, 0x9, 0x9, 0x4}, &(0x7f0000000380)=0x98) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:57 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x2, 0x4100) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x6, 0x6, &(0x7f0000000040), &(0x7f0000013000)=0x221) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x100, 0x101000) socket$inet6(0xa, 0x1, 0x6) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f00000000c0)=0x40, 0x4) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x7, 0x0, 0x101, 0x3, 0x7, 0x10000, 0x401, 0x0}, &(0x7f0000000180)=0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e20, @multicast1}}, 0x3, 0xc663, 0x5, 0x0, 0x40}, 0x98) 22:38:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0xda3, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4000, 0x0) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000440)={0x1, 0x0, [{}]}) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000200)={{0xf000, 0xf000, 0x7, 0x20, 0x1, 0x4, 0xe452, 0x6, 0x1ff, 0x3, 0x800, 0x6}, {0x100000, 0x6000, 0xf, 0xffffffff, 0x6, 0x7, 0x4, 0x9, 0xf412, 0x9, 0x6}, {0x0, 0x7000, 0x3, 0x2, 0x12, 0x7fffffff, 0xdf, 0x40000000, 0x12ef, 0x7fff, 0x1ff, 0x5}, {0xf000, 0x3000, 0xa, 0x0, 0x101, 0x6300000000000, 0x7, 0x5, 0x4, 0x99, 0x10001}, {0x5000, 0x2, 0xb, 0x6b, 0x7, 0x6, 0x2, 0x6, 0x3, 0x5a, 0x8, 0x8}, {0x0, 0xf509a9c246b3cafe, 0xc, 0x2671, 0x8, 0x5, 0x8, 0x3ff, 0x81, 0x3, 0xdab, 0x6}, {0xf000, 0xf000, 0xf, 0x6, 0x70b, 0x8, 0xfffffffffffffffa, 0x6, 0x6, 0x1f, 0x532b, 0x10000000000000}, {0x107000, 0x5000, 0xa, 0x200, 0xfffffffffffffffe, 0x5, 0x3ad1, 0x6, 0x1, 0x7c, 0x7fffffff, 0x4}, {0x5000, 0xf000}, {}, 0x10010, 0x0, 0xf000, 0x1, 0x0, 0x2000, 0x1d000, [0x6, 0x19f, 0x0, 0x80b]}) ioctl$LOOP_SET_STATUS64(r0, 0x1278, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3513f1f95586b7e5b502cb2b01b6516429aee264d9d0980d00cf4e07bd053daed44971359de360ba0a3189425ae876d20088dda6763578cfffd6ff2383f2b701", "f5ef8ceb509ebdbc33f34e5d856d331c2ef2d43ea5cc7e77f1a69dc4522bf4cbe319143e7a4cf3c3b603984fc57c5fccbff7c58a7ba43083d62815ed2a6ef83d", "1536865ba311133bec4974c4bab0c9d2aff74cc757a9d713f77bbd218a00bfb8"}) r2 = semget(0x0, 0x7, 0x40) semctl$SEM_INFO(r2, 0x3, 0x13, &(0x7f0000000340)=""/190) 22:38:57 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3a, 0x2000) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') pipe2$9p(&(0x7f0000000040), 0x84000) 22:38:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x7, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x124d, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:57 executing program 1: mq_unlink(&(0x7f0000000000)='vmnet1-\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xc018ae85, 0x70d000) 22:38:57 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000002500)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000000000000000100000528a75e47ab77d80f09fb5d3393f64adf413c17095657e6d462a72b6115f6949779e8a2fe566fd02d887782fcfaed9ac32608268f5d0ee052597800f5a7bee6b66e6c52cf8dce1e0faa9bee0b5e64881c76058853484054e27ea39e4d5fe84b7f19dcaad77cac5f4537251da619b424b29a07f3a5f63e79ce598b3c5c766a766344e9cce947f0f7fb7970fc70d363de886e4d8c4437f5a2cad256996fe147e20a7c3e824ea97ba5dddd1f307fcd7b1512bb8bd781c0a1d6c1e59c15e30f379270e63e17ea81a3caf34f6bfb30b638061f70d975560e15650c7ac7181fd615bda5b4ac24946249e7548dae643697eff25f584cfe7c3c22b32064ee27822f4be1ed2c42517808ab0a5e86de1ccbf8c971125019e1acf6b5e2372db8ceecbc512738eb8c4e33e89a4c76ffafbb7488a0ea1fab27e0c0d93e522d0df2930f10d1e39e794e6d622f2975c09e64aa2954f78405ceaee2f12b97b69dc24947a91b748d453c2648b8e72334a2472ac5764accabdb7563b76bdce23cd84eaccf85b4ffd9181335380f7cd871c5aad430d857e5eb6e57e7008ad2b253f07450f31d049fcb00fd088bfd320ca5200965acfaf0ea0fbb6abc2545fb4f3e6fd591f10cf342feeca643c782539cd077fd0b2c6604d75c358d517f81a5b444e21eab4935599442ea462ecf92140a5370d7cc9bd2b45c0df6934c78f3093048983066475bcdb1954356ff658b095bf058cc11fdda4e9c7815217fa00461a7be919ea928a1d2f8d817cc41c9f6f4465f3264d7d0d3ca6795bfdb51351bb9fef8b4a99137cbc7ae597eb9117c5296111915bf8f5619f466ea374f02d3931bc464069e8853c2478dacacad2cf68e68f3a6c0892f7cdb9f5653de81533f9f10ddf79759629beb6cdf6425c418621dcbad1fb54fc199ca635fc2ff2c59c4950e5d3acb4dabc9d8973eac49dabaa69e58f0c1fe8c625c51818cbc3116855bc44d86ff13d3a7b30cd33c5929980583a1f25a946584e3381ab1280598f4a9e9bdb0cd5b29f33957a2d08b4a911f4a3ab782adbfce531b2c1c99282cb137d262f797c6c525c7712c7d1aa6568a25259b127eaf0e15a770e604c6e2c450df3e81262cd02dd5f4e1f50d01e11d6e43495a31b82c9b0dfd89d9eee9e91848f131a7d80c5942c9f98ce7a6f9780d4a5c0ff5a755a14386631dd7cfabba0db1cbb79db88559417df3e7118565e6440679a08aec3e2612fae4ab545c9bc8900cc69ed9ed445b3ac489580c393cb68f4f5adf8718296d44f74704d7248c56ff0f4db4e93b5c1dda1da7e2d0ba9c46ee3c4d89cbf3be841dc93ff7d52ed02b447af8cdabd2260f8e8437c40b77d60ed1e8575f3e42e77239363e992dfdc98f17ce8d5f7150842f22e3025468ed0a9a4c28ce3ca95696329305fe3401bf88bbe992782fd51d79d69e341f562820bc543919b9c3cf95043ce6de8b746c1d572a61c1364a6b9661ad0ed3a7a87dd947c5df7a9496b0d4c30d582ae12157f9d45e169abfb2cb0ff60d0ea9a946bf23833cd35e77b0d3bbd25fca2a96955fac02f76ea096c4f30ed7ae3983fcaa699571310d54b12132a71475b20d8ff1c15011ddfb657629a4ec83ecc7a1941d5d275563e05c4e8085ce33939d9f9c5a3bd690c2666aa09feb41072211fe887ed0aec2e5d5a820ca078f5c652399ad0dfcc511868e2d4f212cd7b8129abc5193ca1cac7cd7e197ef5c14c5ccd017b3b4afaace29dd533b96ee4f10ef098298ca849add3da4dbd6ff6d3d0d93e472b4ac1edc3ccd99687282c1b7b3d10de0b1c80ca8ee3505b44d2ebe2e0e3bd52aa67ba7a9bd68954faf15880d2bf350ba764e814f59a043f9d6c9ec5de1061293c6dfb33f014d5ec4248e5471a22e274b5448c428752eff25e4fa7a4dada5cb61b4d553585bafee0b30eab86b82978591abc3126a42697193c621e761add5b3e0f4d2bf30784591dc8332476f77425bb6ef84fed3312f4c4eaed05b6d191efac53b6dfc37106dbcd19de6588217866d971c8401254eae1cc26a963740e25aa8850c503e7c68c097916fce828cd89dd32770ce8352bb659d07cdda0d6b0dcb1d7f57a5e055d53c799e7061dc90700091597fcffdec615d793822c2af17bc55d650977fff10e1cc4cf280b02ab95ad7b18c558556bb132b09e6f23e76703bd19a3de886e6dcc422affe71f8f0e43d9cc01cfeb1f38db88f40fcaeed587f8f65298f53a44c5ace616ec149482a708d13f914e83fcccdc94d761cf0cde4fab43534258f65f85cd46eb16755ca07e4244be9eab7ecf60fbc94c997cef08fbca86966111607e06994a43ab7de31b8591ebcb95b8962bbf6f657b0366344171a6ccf6d3cd8377ed32157c9fbf179e0517a27c8940bea917f63e3cc349261a22ae1e1a0f42c7c20141cbd5eb3976d951eef2bde953f75f5bfbd662548b29265a7029a9b6319422ea530b6cb132172b69157c57ca19ca4dd45c9b598c81ef63010341d903da3ab969ebed7c819d81e03b639ce546ecf681eb1f6b7746dcc984f872e8e716e9a525a7831a15859081f163e92c68dfbc1a2938349ac1437edce1dc6b11db473d1ae5cc1b785e28c838d2c696e98e7c259d83f1988734d45b0b67538046186adc1070c098b62a5f8afb285a8cbb225e5ed8c1ee681da230e9603f8062ff96680666f86b37841e468bd570dbbbff913ec5f97573a19d8ae0171ca8fa96f2150703b3c91bd44451be4c4b7b5b938841ac175ac6ff3f2107dbef66bc79df745898d695f32fd2f41fefd1f4acd24c267835cc73ee6727d8e4114e58ecf42f4a30cc377eea67df54f32b88b0a01ece96e418ae808156fc47cf579f38cefdfb0428aa80f88ebeda3769726ae7788579691a4bcc1a4c0d53ccb9a32a01f6ee600e25350bf0de477829e48e43c4f25181501a5f22d1db505ddcea91623157a23f9a045e591b1f878cfc33a84a9ca6e9dc752672433cf8abe2f20ce154f3294e8bf34e98f4248e920e5c575ce05eb7fd00fb5fdec3317b22f24954998372632b17a65f00e6cd468d30921d894f786f835a2e016653259ed3f42c94e834605d68d10e97867809be2159b88a9f7499c3b0cbd584638aff7fa6afaca621ca2b9a279fe7ca99a376df93462a387d388fe5ffbd9e120416a6f6eef81e8e9cdfdaf07758e38889964a7a87b26b8462f46add7de0fadfe862623e59cc5b58595fca2146ebc569b19c266db46b79e78e6f3d3de69f788e6968291084fc17fab298850a27a394795d138e1b8ed929b8f2190452e5e11ef8782d6b4cda1edb7e70b86a1e627b2b064cf344bb2e5bca8d1da98e9b6c1f97641d29a7ef7c23e588b598ad9da92ab67901adfca5e3985e73a963352e8dea70393b8f7610aefd86a3332564562ae5e8114883e8d9ff3c07cfe51b74d54c5880851c1a10067b27f2d69c663155da9435763e8038f1b94c52545c210726f451608bbd24fbfb57a98e8de6abdced43f6e43f6073fbbf185cda0b301cf28527e2c2452972646448b1e85b21de771047fe5406196a0f122d73176419724fb5ab76ea224d830bbd1c243c4b9b7e9d647370f502e39c2c7e139e1e19a4a5db26b5ce2d72810b6226add67354d6f42cb61d5af81065ff5c58e3781c06cca74557574e1bc945d101f64367bd3a064a05f8812f11ea2ff717d32c2f110606205888edf85f44b5cd749ab8762a222c55788b96714842e516b766cab38c57f39c113216134502451bfa0af9b052019eaa59248f9b10a6452c6ebe89d7e215e6f818b6d87a0047341a5e3936dc26993217731715e65ddedf373a9792775b9a21380d1a314fbaa8b97a78e4d3ac5934a9504a55b1e79ff87fe2b38e09b300ea6d4462d9ed3f55c20292ef1db262b1748ea27f1e9dcd41c22cf6b8f295dbcf72ab9a4dfb6a7500ba5a3e09e2065a07ff9979cfb886b90e719a56422c17d5aedbc035414e3049f4598de21cd22dbf443fe4cf4002c59c99c715f8ebf66cd80ef08c66da2b73bb6dfc270bf54a510107b8e5a697bcb03ad6a55f8f4c88a8aeeb202f702883d87c0ff94d9235719f87876b65d1419e73b26211e0db3b2805325eb9926a935e2b0effb1aa0f273b63e1ae3ef078a738d6ab8da215d43788e32268451aa2fd3f05ae9489d3b17848dc645653cd50177a3103814d3a78d68d95006a4343c0b2e036ac4b7b088727b7ba78001033ced6b644e8c8bc55b6205b7d321f0397de7fd7402221db87f6f3618c90563310d29b8cbfd5519e46eb6bee59b93296900378cc761d535edd3cfd331a88b16bd9dcef288fa0eb3e3b9330c32f59ae6420a09fc409e645cb95965199d6a56295869c228544148854cd88a2342f08ca755cd75468e588e1c3397a5d33a8553330ce0476212ac8c28667361e23bd6866202a355b43329a5c23296b4d68ade5fa879ecdd49cf4ce7ef29579104810bda12b1141f7f76da024e41d4302e8fe798734aebe20b0b8231f64b007680ab47fe87be536cffe86f274d27416ca7bf0a15d6e90209b7f6f1699c380eb84a477ee6a5d7325d804739147361aaf138e04bf239799bb4c49517eee3191bfedf26b47cff3ad4401ecca8aea0ed74fc01a0bcf33bdadf1020e7350c96707f5b47c396ea53c2c28887407c01d85b8a424a2ca7f5364ae031a8db3d3fc339518d48fab7623d3a3e6f721784a48a5b8b377046f898d58b46bf651aca9dfc4ae48245b4dd690cfd9e97610c59ad68be7bca55497e07d5818dcf5f235264b0dbaf26cf30e77c7deca1bffe1972a831cc57119247dc568ff9afaede2fc410bf77a6b98643d5bc0babce01b04e5e8270cd5b24c3e0754fd85fb5143bd9307683add083a6ec00d69139b88ea946c251f4670a652b90cbb37cd217df380385c97d462c09f7229dbc18ddeb8a474fc7f0fe656b65d232cfe59d02eb5c44cb6d6a2281156d818c06279b5012c1a775850309940b9fa50d31985c06b547cd898572dffe20fd8a43c73144e5fab3108bd07da9c18803e91e08fc2738d43a3b977880d57fd8e32b9a334c3962561e3513afe4e04babdcf8f07ab8656a2799c3b0941069d5bd90ff5368f8c253733433674cd8566bba1aab0eca30aa0a1757635e616381c7753aafe0ec9770d5b90a86c108984294ab725877bc0e2a0bbba438f818269beaff535497d2c2989a039bef7c8420ca18ecb056e09a0f04757df6660186e3df49478e67b47d2c9595d50b9284575caa1b43a3ce2c4f43d371812a9155c2eac877c8ec90f2272db61037dc0261a9580c13fb0294c572463605ab35598427a72a56066fe6de1ce2a6a1125ac31eddbbac06c133ed7914797277321ddd39a77b4e1a0a8c4aecfbb946bf63b5203ca0d2aa116ac8ac8469ae2a46ffb2aa11e56cb5a889c25b57f4aec35986647164bbfbe2806101d3679c6cb5c5271aa35d02830e0c3a7af3bd6d79f349aa36667c5f34fdeed1cf31bc46a4c39173a42b6873d358c5c701de31f92e036c92ae97df6039bf1c19bf5757e622d2510761e5b400cbc1a411f46d1fd9e938686b2dbbbd9ca28217127f9a4d20b85def4968b6aa1a707bbe9b32752449a70ca31cdf02bfaeffa24b039cd7e5bc42ae1355242ef4f90838493212e4b598bd2085318f34040e04a71f996b247d58b71755bf05fbd67268cfa2cd71467a718de204176b83a8169864857aca506c1df5425bc55e24038551597c9a682ffe4fb5b32af5eb649f8babe2587f261d06a0789b6e9eabb8b5f62e18d62b51fb4a40828c05d136f26202e3c2111e5c051b4d81b1aea8500c2709abef883545c980a88177cfebef2f331edc5c0308ed9b8ace54842ffbe61da4d0c9b01fd73e1056d796de46106045b997ff45599aa42f85386f4c7585a8f1176d811ae4e7c84f536ff23eee4fce06784fb811c2f335e31bc1137ccff38260ec25c946313f64e3a1240a803d641330c71775b38dc47d2d18672debf5278d4b9ce3bb9a8aa0b3c2c8ec297a775c3a99efa662edf3074fe1411af1ae827ff73c71bc532451e07986035ffa7d6d0a9be5d1bc03e28ecd88b38b175767d27b502f7cad2058946f32233744459731377a5423ab35102844245698c33a910d620df23213d8c0177d807688374b2acb1a193d49d881052a2"], &(0x7f0000000040)=0x1024) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x3000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:58 executing program 5: r0 = open(&(0x7f0000000240)='./file0\x00', 0x4000, 0x1) r1 = eventfd(0xf9) r2 = syz_open_dev$sndctrl(&(0x7f0000000b80)='/dev/snd/controlC#\x00', 0x6, 0x105000) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r4 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000bc0)=0x0) stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() r8 = syz_open_dev$midi(&(0x7f0000000cc0)='/dev/midi#\x00', 0x7, 0x200) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/ppp\x00', 0x4180, 0x0) r10 = fcntl$getown(0xffffffffffffff9c, 0x9) getresuid(&(0x7f0000000d40)=0x0, &(0x7f0000000d80), &(0x7f0000000dc0)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)=0x0) r13 = socket$inet_smc(0x2b, 0x1, 0x0) r14 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r15 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/rfkill\x00', 0x200140, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000f00)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000f40)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000001040)=0xe8) r18 = getgid() r19 = syz_open_procfs$namespace(0x0, &(0x7f0000001540)='ns/mnt\x00') r20 = syz_open_dev$sndtimer(&(0x7f0000001580)='/dev/snd/timer\x00', 0x0, 0x0) r21 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/ashmem\x00', 0x521100, 0x0) r22 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000001600)='cgroup.subtree_control\x00', 0x2, 0x0) r23 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000001640)='/dev/rfkill\x00', 0x628380, 0x0) r24 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001680)='/dev/sequencer\x00', 0x0, 0x0) r25 = syz_open_dev$admmidi(&(0x7f00000016c0)='/dev/admmidi#\x00', 0x633bcd70, 0x28c43) r26 = socket$bt_hidp(0x1f, 0x3, 0x6) r27 = socket$bt_hidp(0x1f, 0x3, 0x6) r28 = syz_open_dev$mouse(&(0x7f0000001700)='/dev/input/mouse#\x00', 0x8000, 0x101000) r29 = dup3(0xffffffffffffff9c, r22, 0x80003) r30 = syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0x0, 0x0) r31 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000004b40)={&(0x7f0000004b00)='./file0\x00', 0x0, 0x10}, 0x10) r32 = socket$kcm(0x29, 0x2, 0x0) r33 = socket$can_bcm(0x1d, 0x2, 0x2) r34 = socket$pppoe(0x18, 0x1, 0x0) r35 = socket$nl_route(0x10, 0x3, 0x0) r36 = gettid() getresuid(&(0x7f0000004b80)=0x0, &(0x7f0000004bc0), &(0x7f0000004c00)) r38 = getgid() r39 = syz_open_dev$rtc(&(0x7f0000004c40)='/dev/rtc#\x00', 0x5, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000004c80)={0xffffffffffffffff}) socketpair$inet6(0xa, 0x80e, 0x6, &(0x7f0000004cc0)={0xffffffffffffffff}) r42 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004d00)=0xffffffffffffffff, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000004d40)={0xffffffffffffffff, 0xffffffffffffffff}) r44 = creat(&(0x7f0000004d80)='./file0\x00', 0xb0) r45 = signalfd4(0xffffffffffffff9c, &(0x7f0000004dc0)={0x3f}, 0x8, 0x80000) r46 = openat$tun(0xffffffffffffff9c, &(0x7f0000004e00)='/dev/net/tun\x00', 0x644041, 0x0) r47 = syz_open_dev$rtc(&(0x7f0000004e40)='/dev/rtc#\x00', 0x9, 0x40000) r48 = socket$nl_crypto(0x10, 0x3, 0x15) r49 = gettid() stat(&(0x7f0000004e80)='./file0\x00', &(0x7f0000004ec0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000004f40)=[0xee00, 0xee00]) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000004f80)={0xffffffffffffffff}) r53 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0), 0x4) r54 = socket$alg(0x26, 0x5, 0x0) r55 = syz_open_dev$dmmidi(&(0x7f0000005000)='/dev/dmmidi#\x00', 0x9, 0x2000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000089c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000008a00)={0xffffffffffffffff}) r58 = openat$vsock(0xffffffffffffff9c, &(0x7f0000008a40)='/dev/vsock\x00', 0x4480, 0x0) r59 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000008a80), &(0x7f0000008b00)=0x60, 0x80000) r60 = syz_open_dev$sndtimer(&(0x7f0000008b40)='/dev/snd/timer\x00', 0x0, 0x20000) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000008b80)={0xffffffffffffffff}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000008bc0)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000008c00)={{{@in6, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast2}}, &(0x7f0000008d00)=0xe8) getgroups(0x9, &(0x7f0000008d40)=[0xee01, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0x0, 0xffffffffffffffff, 0xee01]) r65 = syz_open_dev$binder(&(0x7f0000008d80)='/dev/binder#\x00', 0x0, 0x2) r66 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008dc0)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000008e00)={0x0, 0x0}, &(0x7f0000008e40)=0xc) r69 = getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000008e80)={0x0, 0x0}) lstat(&(0x7f0000008ec0)='./file0\x00', &(0x7f0000008f00)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000008f80)=0x0, &(0x7f0000008fc0), &(0x7f0000009000)) r73 = syz_open_dev$amidi(&(0x7f0000009040)='/dev/amidi#\x00', 0x1f, 0x400001) r74 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000009740)={0xffffffffffffffff, 0xffffffffffffffff}) r76 = socket$inet_udplite(0x2, 0x2, 0x88) r77 = socket$xdp(0x2c, 0x3, 0x0) r78 = socket$packet(0x11, 0x3, 0x300) r79 = socket$inet(0x2, 0x0, 0x200) r80 = syz_open_dev$sndmidi(&(0x7f0000009780)='/dev/snd/midiC#D#\x00', 0x100000000, 0x4000) sendmmsg$unix(r0, &(0x7f0000009800)=[{&(0x7f0000000a80)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000b00)}], 0x1, &(0x7f0000001080)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="2000000000dfffff0052000002000000", @ANYRES32=r10, @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r18, @ANYBLOB='\x00\x00\x00\x00'], 0xb8, 0x40}, {&(0x7f0000001140)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001500)=[{&(0x7f00000011c0)="48b7fbc5c5b2970f032a07c1c416df6660859ffcc1c8ff3f474a1ea9f4aff9e80586e65377a3b2f2507ecbbc68469e0556e6ea33a83d441565371d78e320cf85933095b2e7cf4acbd2c7b988875eeadb458acf04a8969e97d8", 0x59}, {&(0x7f0000001240)="afe685737208ffe75caa19c21314d425bf3d9206095b071eeb41d8306ecc488674b34782ec538ce26ce4de14da9dbe32c9fa25f2044a35fa92ee33b1695c5de008934582a42393e5797f15fd7de7599395fd9f995027d0bfe0aed2aba4196cb213130d028451ff073ceb405bb5477039721f9551ad8213e544a1122cc3e4eda56177149a561e3fe153f5e2ed286e22aa3451d1098905de30c633840629cd52ead02eb069ce331cdb18639dc05c746208bf63b8dfcb36e9c47402183b2e17024afe9831840e9074ef19a70c97dc01e24b642598cbca7653bb58794d9af724b877b794", 0xe2}, {&(0x7f0000001340)="63f65af980b4ebef96131b500247f19bd98708f05c80328efa61b9c70712ea61048f8f19472f1195b65728da1a135b423ef1bc2fa3467dc83f4bd2a63925e08eafd150e6a54c37b2a5b519888c892bcf0138dba23aa290070b1340192b444ed010f9ed2111da13fb42feff1fb09a2846873a06ede0798db7163992011319d9ca39e74a4946fde3cad3a25dd27097a16af78d989e63900039f43c8142176d3efa2d6f264c2ce16b81", 0xa8}, {&(0x7f0000001400)="9f3f97d88371cffb904b660c43af355d899432e6534dc57d200d66eb3173d8819368474c3d79f95fcd784fbf1ffd2e8b9adc2bb18eb68636e098d2faf37231d625bbd2a390e61209537bae6119f9a09fb7c3d5d9a471e7c5a6b44b97c91fdc2fab56a957a7769b014ba5cad57859e69a51059225c94ae39082ceb50e18429125697b8c1df250c18a2e8bdb102f51dd0076d1cfc90c4348c4d80fa647f97018be168e0e80c3e5e596bb848ee3904d17dcd2916bac59b16332cd8d8a0aec5cdad3ccc8a08a2f2a159bc9f1c9a778abd349e1af06350e9a4e86226398f93ba1ccea5f513ea620e2264006368a1e2d51971c29d2", 0xf2}], 0x4, &(0x7f0000005040)=[@rights={0x18, 0x1, 0x1, [r19, r20]}, @rights={0x18, 0x1, 0x1, [r21]}, @rights={0x38, 0x1, 0x1, [r22, r23, r24, r25, r26, r27, r28, r29, r30, r31]}, @rights={0x20, 0x1, 0x1, [r32, r33, r34, r35]}, @cred={0x20, 0x1, 0x2, r36, r37, r38}, @rights={0x20, 0x1, 0x1, [r39, r40, r41]}, @rights={0x30, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48]}, @cred={0x20, 0x1, 0x2, r49, r50, r51}, @rights={0x20, 0x1, 0x1, [r52, r53, r54, r55]}], 0x138, 0x20008041}, {&(0x7f0000005180)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000007600)=[{&(0x7f0000005200)="502c1a3079cdf2c5cfa4c012651b5d0ca386db39032d9f193a041a676ffab58e13", 0x21}, {&(0x7f0000005240)="aed9421061b563ea4e9427b0b4946f2583bbe06c26beb6220c05244e220bf92f1eb58c2fb95095716986ffe8bbbef9ff0b597acfaa5a4ec2f991f668a22cf19a87a1bc9e5c59ac7cc9be69190d3f409fc381121d18db7b0093171821a89a7a43db7c9d30efbadfee70c29f68ccbe75d7139111ea4f510c6b3de8998f96efefd1bba92714b616839eb23c8193bb3efcaa632575218fc5343a25e7859f0b197b979a99068229498aaa05f4dc22b9f78e490cf5f697c997c8504293ce389c664601ee39bcac39e740397c058beec0a885a10364c3a209003927f819b30ca5836d58bd7a8e24e494cebc", 0xe8}, {&(0x7f0000005340)="2f6478c95b7fd97c54c4595aa75e5c9296a452ee941bac6fd250b74262e05bf6ab332f613a6f1cdbae1b6ca9e89c5671be356d4c7b2d", 0x36}, {&(0x7f0000005380)="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", 0x1000}, {&(0x7f0000006380)="6d8de93c91c2affb58fa5b99d8ef86b86440fd99202491a6d7d0bda9b39071eef60f85d47f8f7f6f86fcd87f17274a864ab8b8d2311c90b675a84dfd4c7196c76f55ee90dec6", 0x46}, {&(0x7f0000006400)="6c7dec0498696b9185193145dfeddcf62fd41180f6f474daff88009200f093794c394932dec065c4436b025159fe88a8d1b0fed22559797c8f7ffd97aacec26e4e9bd327a7bc9688d308aa96e6c67a3909d2c4ca1089eca456f9e79ab1eb7fa1e8a297ea10fd35cd4856374e56232da1c5ed558c0367f11a3a4b370528305ce5703e5b86f8220237fc0ee133338f7b264b6cae4504e30da40047990ab466678a4f7421ad250989e8c8ddabc008f1275dae5f124b1a344b11f27cf474709820f1931a2ccc830b1b404b0139daa673c37786e16cc74f8df47b66252d3c7309c3d4f3403feb9ac35ad83d3542b9b390e7cec8c96111dc2d3f9669a2a85e6da8eb513c272bf89d89f89832830a730190161e35c0d727439e56ea10815a75ad4467ee643c718e913dc7eb0a8ad2aa9dfafebfa29b5ad61f0ad01fe48ee0854e167aff53caadf67adcbd62f42a655f28d475328126bb8899c62b1b8ce3741699d7263666e1f12f2e2869e115eb07df33b8b639bc6477ebd5ad90ece1996fc1022e5e8031d23430db82a1c65c102b5a84e1d4047f783bc0c8d269cb7bad0ebfa6905b2bb91958b0f9d303fd49404b5a8c57385bbe92785429f78a8bc71787c55d1fe30b883dbac29b51059416614ec858a0641c9772f55704a45f2de57d4d908f854fb6f003731b0fae1e6cda006b5609fb53d9b0399887121ad67afccc86c9be506ae77928af7e504911251ae14446d3fc857646d928097bf6d065261cc09b36b08c6f19905aaf17c956ba2b0e1a7a9a3feb3fbe22e6241e032cbdfb905e51391d6a85bc7b1b72fe69911ad89c6112a2deccf0a8a0c8fa6711a32db7e3bb4425be85e2af6d2b53f20457b134be28540476cd560a7761e724a302696a167e08d0c6310273069756ac3b71d457e4eac9bf8ad730302fa4598a54ff30455aa7d6294650229f529fe27d5f5b3cd32543f48620ca65fe7ee3683ae67859f731dafc450bf921fd567c88515ec5d3e2ff65dee88ac1a8f9dec9bd298d6c40e04e6777f8b585d45bf3f8ed7a06dc5c3cc7b0811f0bab9a229e4878ff1c531fb4740b1fbd7186a34dd2e6be909b029e57a88c8ebbe6ad19478b73c9b39c5b04a10f56b4dff3ee189173a6ac1496361b665ff6670ef92712508658a93d0b45bde0594b8d845d13de80fe0e80e879db6af23e4912e121eb334e1d8cf79f3d00fabc81fbceba8e300917d39865845fa9d5b0c157bcd53cddbaa386956ef148ef68328e34d5996c6432937c06f325eb8f0df33cc11b03ce85d49dcdddb6607d5b5663386a39df3a8a2afbde251f3548b6f45babb9d0aa9f78d1495bdb39a8a97ae81f483cddccad573046f0ae1291a3c88e45fe110eb4fb45b68575425236e14aa76c51c0670c460bf27b2d0ea440cb53c9510ca8eb59ccb9054d96b4c1bfe3d257094a8656117a3765b47b4e424b031a9d5fffce9777f6cc4436c5270fb51b27cab5df6deaae9ef23656014d0f1bb8307266f0d7ae554310858a86cbaa5074c41c98b4ef86ed5db01716c4a267575b7820be4baf5489d737c3181985209bbef3d836790808624c09645bfe9cdd40b1621adb01c7cecb400477e340dd145b54c5cff2715d8e6c61abf64afd36ac3848031b764d09cf1484ab235479a124f652a98a9d528dfb396e54424fb83fdb20f19833f3c44b0c18ac2a33cbc3d98d30d8756ed816efdf8e2f82283f74aecd3eff5baea7479d4054990361a8a8d8d2b6930d32a4c307e1d4e6feb8bc1dcbee8ea8b6a28b571b80f2e4773c22208699f940fc9923f9e2d232a9ef5958ed7931201b1fa67d4d3f0c77dcdf36e498e38828c45d11ce3afb13a37017ca9bb34e786e7aee09c91bbd55757047eb141fbf779c87f911c0cd67d063da186c79837345b12dd100e349350f9199f8d3b65e3ca183ab7b2c95ca6a6dc60f7b8496ffd716bc9e5d4b80c308c3ef106550f0cec84f799cb6042932b6a7c2ba5895eb8aecf2aa92702c2fe8d86b879474fc7da3a773b87d05e374c1da8d2d27632c2263f9899dd2bc9cc8e7646f1d24a1a25fdbb0df1820eb55b4ee93069b49b6420764295deddaae263030d2c51b6bea25afd4e39f162d688e3ddc1d37acb9cb96ddae9bfdbe45a0006f66df0bb05aba9b869ad32b6ceafe19dbf591faba7d0f721a483fbce1b0355844ddc98d71ab7a38b4332622db9b043fefba2b0bb9ce0d262693aa742cf152a210e048b00fe9279d3fdd05855ab9225b5b8a83ca9c8062c31823c40043f0504a1e69b9c09d1de065032d4533298485db4b69a0478ac8ffad4e04a088a49d48db2b6361e2639354b14abd0f8d31e368132aedadb662e147bb513ddee408aa0e1cf501e10bebd240e31cb6343d676fae08e01f6fc6c938ac8ac01f0affcf309ec42e2416636564eb7b45a783954791abf315d1f0c7bb2689fca1fbb9f1917b3ac7567cbc5f469fc09982e47884b2b2aaa0978dbe3f26c7623523e6811be71949dedb46ab31bb58dc200f7ed3925067cf3e53fc611879049c0954c675f41c041df1dd2702a9a7e5b0da36f4d57095561e0e6e34bc57bdf3d3b9ad620164223649ab868dfb80a5bc30b6cefe6660083923f76518c11d970da2e4ba0acc942d105cadb3760a75ae14bc84e39fbdbd4140897444003beb6a8c7638527d5f654f492b03288b7618246afee345328dc94c01af1715277705537a5def6499357d0820ed322fe8432227a9cd5cdb11b57b6b01bcceea5cd145e6033fb9678ffbe66b38709152162e005fc20b62e8fdc18daa4b5c338e9992dd73e0e9817b1dbd3f33a5dc2bb61d94dfd8207679cb694b328d478064f90c247f199f35ab236fd7231722dfd98970f946d49bc4dfd8ca5a3a99edfcbd9fb5d4d8591e84fe83090870650d039825b76c7e3d1ba7fce505a68e14085ad2e0702d9df25d27b73f5f52c24a437c4f3e41f9d8c3a719838e900218928ac48787a3c4a73970530e646afc24a6a93a925d4423717851a9297e8e35387e2c2938a34471c5f3bd86d7cd235b9e6d7698cd510d8eac97e4c52a6c799f3a0053881abd549630e632902577f0a7b9ba9fa3c0f75dd887ef7a189dcd6a1f90372a7c48bcb2b2e0a2896ce5809f11f86bbc4cda38a31d6f62c66942e6acc3256af013bbfbf35eb9c95e6f5a668985652bf2268897f07cf570c791343e8aaaef239cb9071963d4f6c11fdcc7b7aa4d53dd9c647565db180f525982516258ad3e93c52bc0f9f936c37e802585fee2ca296a37b22be2b519393c449acaa6069e500210001869157f27a4c61748f89ff6380a4fd0b14f9dd0733db2f7aa9bb8e40475f5e414dcfd81209f25dc3c6910abea31db689fce32d57f001690628d37fc4c8b76e78d8fbf5c9d76155bfeeff482523d9c1e075fa5ed18aaa398bdcca293f0f58c8506010e654ba06a9e728d6ddec1714afe0fa7b8d43bec16e85f23dd51aff2dd9709d8b87a6f94915ed2a799fe4ca194d730bfc72861f45f0e50853d5d5238f53190da738f87fcd8febcbf4511126e95f33c46710b8223c842b48cf352d267db093bb00ff5cf70ceb7f6cd7408b21010cee8ef5d86fb9f8e7cb7d96d25b955996b4fd13720fe139112e9e15d3e187603577dd628f996858ae20e82bf707474c76b40c574928c1a26c615e76446d2f5df3cb735fef557481a40e3b243d2837f8ab4cabd731ce912735e1a1a72dbfb2654cf6e84d64355bb6404b507c34a45d82e990855a20b2e9e8415146b95a8625a8e0f0d45fb3e9ab81d1141039683975a976efe788c43df75d25ad81c1e65de3471dbc348fbe628f3b9ee2d039085704c36d186b26c600dac3f244dc92001f7592d70f54dfb2af2c13dbadc60ddd27c79cbcc7a74308c1b1f7b37db73e0dccbc9d1c3839e6820266cc1036a355f801266f6b0b091dda1f1b4b3edb9a433ad0c710b9b00988996e449886b8460ec053fdc8d598b9aa23e28850c74fd57eb669076a273a3f2efa682c47cd4f995a583a9098abe527134e1c3f4f4e4499708259c679a50023041690353ab5a059f9154696faee6561b0af4b67724e2f78d0097af1fe4ff19a5d6826e4395c5c073c7b16ec05114c867bb99c1d6e1e90398d1edb57d8a5a7bbe6edb4873384fbb1b0ae5ab725aa77823c423e260d0660ae0f9ce8de72b48be9c48ff81926c7cf6900122dad31886b8c0ca1b864dd0f6573dae7ab74cb4d6a0b888ec60243da2b184c66d8d6d41ba00b4aa99a0071c3baad1e32f0f1997d22c20624937beb738037e06d0d1574ed7c59103b4c0910b3491d81421f15d6405586965198e089d121196f5e3a0ea081473b912f82a76a75a131d5e39a6d4b3bd1852c3033288935df93ab43e9f86a8324e168177a25bc339943ea7b8f13ffcc705c47cb7048b36a9703deada8c7871d501122610d9d20aa22879a843657a3d97d6b3a1059444f4dcbc64b3baed498a33d150c5d49600557ea71eb2e0287218cfebf061511e4bb8ef6bc20846617ce8ca1ff050faf56e3a4e362061dcda8aae12dd77181c6cfda0b4184eb27c4e189bf50631b83212f4f18797696cfc492fa2870b8e031fd6eb5285fd1b88f453e5e5bd2b42c4b78ae539510d462d28c71b7c4efffcf24451bd185e3e40547a8aa787964bb86342be09198f5522e3e50543331220c0782ca77a7f3837215e856d282eeab8c4c973c5ce2deadb3198ed3ccd5bfd626fe304b9683084bbf0efdbb371a02e3249dfde22aec06fd0d9167f0770492bd1b736a7e4635f2d6ff3bfba1ee7efad58e2666e6bb778f04ea3eaf64c9813726e8aa80b5a623d8f02157fe820f2d3c93178f2ca8aa1b9f134a7ca44318fbc2d26c1f6479812d44f144ca15be9b2306a401fd22446132f018773e8a5aefccdebfb6159544ea1c83fedc874cb4b8970052de76bcf9491e0984219e5629c3218b49adcb42775a7bab2fa5e1adabd9a436befc628c5f6b7d4551dcf083e71dd3f617b991d0c2bc334f46c182cd89a22c3f571c420d5a52123233e370ee161b5f0463293b8e4d52b8610205645bdb91ec9ecd3eadbff797770d776e69c15d122fecfa341b02a970271df6ea29f255a7d875bb20d08830cd6a3da559e20fff44b44cc4e9592179ddae6c4edd7aae8d756480ebcd46bf738ef98f0068315b01783ed4817bdfcf57608ca8a8643868ae154ac872b8082d38102bc50ac614e25bcd4b0ec1cf47b24521efeb22ce9e569cad9c10b44a83898a35c4c698dbc05939be679362fbcd7d6b07dbda03e724e741d1fd2cefd217233265943f0b9960cd945892047b8ceedff14886d9cfcf5d3d2ab2766e9055fb14a27cb2661d1ac3f424dd56a2e5c50184711aea7401826156abb59a85f51cc94137a65126b15cdf406634934a06c8ae18cd245d63c71f1b45cfafcaaf777ebc6cbd9c7b31d798c528eec5ca5d47ad70ab2eaccfd6ef2ffdaeffbb7df291168f83b0fd0537e269cca6641d7cc8758a4525a402434e21ba918aaa77ce18f85b2d85121b7693be6d0bdaf2b0b6968ce35001371b827d011640882d8466ea60ce031c1c3a4f3a6bb1e30c3573c520ff60e853c3bb28678419c3c02965c02e335fcd39dd2128dce8b4369edda130493c27b4f1cfc028abb5d4c76237a8b93d118952a438e296d0b4429699a0c31914058a62ccc9664e84505387e2ccc195352bfaa9877a0cd7aa243c739046168548dabfba64a5cfc1a3aae720828f57d40aa4e2e755f5a40b02fb300cbc4678845a3c1ab20e3b543a4003489984090d44e6187d759751db2de1855", 0x1000}, {&(0x7f0000007400)="508f12b144d42b133b729379ae7c9467102930c7949ba39c006abe211a3dfb3d4ccc3b185ac32f7423ff44c5bf965275658904cc3e4c787af77c64487319298b7a6098c214233d97ad7ca8c789922b8e76cdf4", 0x53}, {&(0x7f0000007480)="53aa347a8be28f9eb7ae7adaa4d71511e7bd0bc8c4348462485b448b41df97051cff929113de8ddc16619c314dda295178c7147178b9d77aa6362b40", 0x3c}, {&(0x7f00000074c0)="21c1672e72880c95f2903e72fd8da668d3aa8f158aa14c58b3f34fcbb44aefb9b8bc", 0x22}, {&(0x7f0000007500)="79adcf53b595a7545d3a017c056f473acfeb969f7fa68b283103de23739935e39449a6a966a8f6b306a40e6fb46f67250425dc18e1efa10274e9e33a5743c433df473cf8345e964163dec9b01b073074d76efe8b4fdb0d2829ff77f5fcb6a486753b0798f44a5bbbd7b4e6935e23e5b4eaadaf11fe39415366f8a5759b6a265842ef8812b0db8d8b59d8aebea438c92e044c3d52a0b965cd8586760b903a00e908707430c64015e5ba7bd273c972145e5c1f468850829d929d76918300267adff91a9918b3aafe12c185620d67efaa6f59d3b648c0a8862f0b43ad", 0xdb}], 0xa, &(0x7f00000076c0)=ANY=[@ANYBLOB="100039b10700000000"], 0x10, 0x20008801}, {&(0x7f0000007700)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000008980)=[{&(0x7f0000007780)="47f4d6d3140ee08bc0d74e463ffe6f12808e0c8641c9afcb4617b55f55cbf631e356f497045f3b6c1ad8a2fd246e0be9f4150b16e2b636148500904b3064c3f56cd6802fa241cc059268924e492325180a9c811a757aafe9f00075ab253e3a96146e2ff71d02dab2c8ec783b792d92a2462d8b67cc82a7b14ad0d23722d3a2bd64e4cd32263dad525a1345ee5f41b2390c17ce81eb185c15473bf7322d12e46426cbe9acfd202c1022a421ff1b6af510b91e1498284f646513257b03eede42d57df5e3ab9a086415b05ec6dd67a38d7edbde6ab2aadec455ee03f95f5fd84afd74784b892f4cb4682466d537febcdad111a96cdb70", 0xf5}, {&(0x7f0000007880)="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", 0x1000}, {&(0x7f0000008880)="5841c57a024e6e85f6cf1c1b79b32c626baa0acb6359572b71a9f4133f0f412025781d3f6169371ef5035a7b7687b281a58dc90ad1a9cb02aea6cbcabee87eec0d9a1fe92704f71532e368320df7183946cfc4d6679bb010870b1d00f16a1fb1d94f71277788249ec19df5e68f58aa157a5643a1a525acbe4e455ebe54ebaf127e407023890b5d472eac744c9107e84982a96456f3f0c8e24dc9bf8b63c7f1d1f0057b4145cf3e33edc8e22a1e576a941c0d704369120d6ca2966ca407c8ded79045d901a8f5d32fc1a2ca9535f48b", 0xcf}], 0x3, &(0x7f0000009080)=[@rights={0x20, 0x1, 0x1, [r56, r57, r58]}, @rights={0x20, 0x1, 0x1, [r59, r60, r61]}, @cred={0x20, 0x1, 0x2, r62, r63, r64}, @rights={0x18, 0x1, 0x1, [r65, r66]}, @cred={0x20, 0x1, 0x2, r67, r68, r69}, @cred={0x20, 0x1, 0x2, r70, r71, r72}, @rights={0x18, 0x1, 0x1, [r73]}, @rights={0x18, 0x1, 0x1, [r74]}], 0xe8, 0x20004000}, {&(0x7f0000009180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000009580)=[{&(0x7f0000009200)="091fc658056e30c04a2dea8c9f98e9594d9c4b495327d96d81d804a265093710d972911affd9", 0x26}, {&(0x7f0000009240)="cbacf8acc6caf8c817ec32a10385bd4df390c70ccd376d4898e195eefe9fb6d07fbfcfd11eee2bdfe4fc7bb9d25cb73bdd4ce10c7de4a82a7adf9bfd4f67edccd32417494ac8b1fd468737aaa2793574f21e6b5ad81a426b352f94972e27f9017ccfa31426f96879ec51f02a07a63ee6e83a", 0x72}, {&(0x7f00000092c0)="60cc326a058689a0ab6739f4a645974d2419cfb59ad1a447397aa22b0f1466168f20228f336ea84258e4bc87880a3a531a8bdcf127851da3c21410257eb7e0a5c05cd7b8f79a4ac0dd357cfb010dab4cd753f87e820f835afae93423f5cc552f0bde7cca103bf0e9f11527480a9e90b2846eacc25f4fee8b2f6c0ae0d1d139078c9002080a27ebbd71cab0fe0c4276fa88f461e22653c8d5bba5feb53019f1576b1bb6a8db962da3c58d911b94223d3b585f3f55921b8afa44f18f7fb3cd898e5d81b51cb1d402f7fa172b", 0xcb}, {&(0x7f00000093c0)="ca14c3379b3c13bf97ed0c41b97afa3876bb84ed52908fd5d6cc11ab4a6e08a4b3c135f00e0fcd3b9119d3135e7d92496c3fe4da9aa3ab919a4fb362f30a43419295ed7aaf2de04f1af74d8e86f362e3ea5db31e6ae69e6dbe00ea2209ed0b0e7e090c3082f2b9d92fb9b9ebfb121a", 0x6f}, {&(0x7f0000009440)="b5d8daf267c110e617f6ff95e495dc59f09d0ff2987335c22dbacde41289fa7643f1ab64ed4214905a", 0x29}, {&(0x7f0000009480)="47dd9982d04ad492594292318d19d2570a183bb3419da1db4932c636f9469f41fdbf5018827e56cf036778daadc4bfcf35aec8a6fe9e526c54f5cbd8b743e16013981b64955a11ecb73fe4fea49e1bc61583fdc7de749ef0028548745873906875b2d9ac9d5a282746db03b8fd1e551ed485adcf736d7acc6eac158651b1ece54a2b45a73123814fe51ba77c0877d097699762996cbf8e6c5d56a7aed0801873ca2ffd52183e5dd3067a87a80d532210192ee78f229f13d222daa8c0eb1847b57b52c6", 0xc3}], 0x6, 0x0, 0x0, 0x1}, {&(0x7f0000009600)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000009700)=[{&(0x7f0000009680)="72ed28e86ec7e8e0e4fc8eea893edcd1426c531301101e9d3d7cccd0c3245169425c9efabe63d9", 0x27}, {&(0x7f00000096c0)="d9b9cf92c367", 0x6}], 0x2, &(0x7f00000097c0)=ANY=[@ANYBLOB="28000000000000000109000001000000", @ANYRES32=r75, @ANYRES32=r76, @ANYRES32=r77, @ANYRES32=r78, @ANYRES32=r79, @ANYRES32=r80], 0x28, 0x40801}], 0x6, 0x800) syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000280)="0001000000ff000000000000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef0100010000006e5fbe5a0000c9ca68e30d69e5000000000000010000000000800000002c0000000000008893", 0x66, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="ac"]) 22:38:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = socket(0x400000000010, 0x3, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85715070") r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) socket$alg(0x26, 0x5, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r2, &(0x7f00000002c0), 0x400000000000174, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) socket$alg(0x26, 0x5, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:58 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x682000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfffffffffffffffe, 0x40) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f0000000080)={0xa, 0x5, 0x7, 0x1f, 'syz1\x00', 0xffffffffffffff7f}) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="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", 0x8d6759b43557f55a) r3 = accept$alg(r0, 0x0, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xffffffff, 0x22000) ioctl$KVM_GET_SREGS(r4, 0x8138ae83, &(0x7f0000000600)) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="0a5cc80000315985715070b281e59ff6dc5a80e73a98fb1a7b399f98501336bc08e26179cf13ab04f29116e7") r1 = memfd_create(&(0x7f0000000080)="6d81351e39cfc228a4c67200", 0x0) fallocate(r1, 0x0, 0x0, 0x6) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0xc6}, 0x4) lseek(r1, 0x0, 0x4) [ 1671.155112] EXT4-fs (loop5): Unrecognized mount option "" or missing value 22:38:58 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:58 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f0000000140)='/', 0x1, 0xfffffffffffffffc) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00') unlink(&(0x7f0000000080)='./file0\x00') getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000180)=0x4) 22:38:58 executing program 1: r0 = socket(0x400000000010, 0x3, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85715070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000006000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x2c) pwrite64(r1, &(0x7f00000000c0)="c8bebcb7ea2895a8c047f9a8253fd353aa951cac309512ea136825e05ff803aadadbfc2ddc0d5a6a7b878e58e62954ecc84f29093aa1e866ba3e8306a6d6faa3a8c235a591cab80fda2a04cd030da8d29e0185d56b340679cb3cec0c2128497ec91de0395eb8c27d73a3878a9b1d50254688e4fd4307b3a2b30eb19294f9ab86660e99d19edf571ed45bf63e3a7c71b9b7fc532dc911806bcbb83f7b57aafcae5c4193652d755924e95c0398dbf27bce3feaadf4b39d84e8efc394de3d39f914", 0xc0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7ff, 0x80002) bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0xf, 0x5, &(0x7f0000006000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0xffffffc5, 0x1}]}, &(0x7f0000000080)="73797a6b6a700183f4f69a28b4a9135eec9746a7656c6c657200", 0x4, 0x1000, &(0x7f0000008000)=""/4096}, 0x48) 22:38:58 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="ab4f3fec94248c32e27d04000000288a", 0x34d6e1a04f3469a4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) write$binfmt_elf32(r1, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x100000000, 0x7, 0xfffffffeffffffff, 0x200, 0x3, 0x3f, 0x1000, 0x42, 0x38, 0x3b7, 0x8b, 0x1, 0x20, 0x1, 0xa61, 0xa7, 0x80b40}, [{0x5, 0x3, 0x9, 0x2, 0x3, 0x6, 0x3, 0x9fb}, {0x3, 0x0, 0x3, 0x4, 0x7e, 0x1ff, 0x0, 0x52}], "3b44a77a4e64857086c36813916df545ce3af5fce2b2948b71b4ed4929a1dedd3c61d207b42d6ea664f0896c1a75968d07c92873a683f11725a1bd3bcf86992928f6cbf30d282930dbcc01c75177a512ce688177e97083e0be76aceaf3bc447854310e27d9fdd266c100d434331c0804766b06bd62216fd27d16e302788f7a62f4b0ce18e69c11db71511d8957445ae12792452357a619d83d2f70e849e4fd8d99d9ae122c5bc76e823c455fa732965b50db76dbce16b7ebc585293ce140c350765b0e24c47f459f", [[], [], [], [], [], [], []]}, 0x840) [ 1671.270024] EXT4-fs (loop5): Unrecognized mount option "" or missing value 22:38:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) lseek(r0, 0x0, 0x1) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1d, 0x1) getsockopt$llc_int(r2, 0x10c, 0x4, &(0x7f0000000040), &(0x7f0000000200)=0x4) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x17) 22:38:58 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x3ff, 0x101) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f0000000140)={0x80000000, 0x3, 0x100000001, 0x0, 0x0, [], [], [], 0x0, 0xeb1}) memfd_create(&(0x7f0000000280)='/dev/adsp#\x00', 0x2) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=""/17, 0x11) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="4100000000000000000000000000000000000000000000000000000000000000000000e76ec2a6ba93ba6dc92e77cafac56fab94794b40634a9d9e97e7ff96f89637314b1af12240e03b8608d52b261843f6da94a6e80836dfd584a82db95e328e56c033fab4dd39c0e59b4a2811cf39f96c413f64fbdedf0225a0bbc26f05293c75ea21a12a93ef648ac4ce9678908e98da4b64f9298aac2b868029ff64f1baaa7446dce98b9bdcc57252e1254b0bf874981b73f5284136c9323abbddf6"]}) close(r2) close(r1) 22:38:58 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x80842) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x380, 0x1}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000240)={0x7, 0x7, 0xc0000000, 0x4, r2}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:58 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000380)=""/224) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000740)=ANY=[]) bpf$MAP_LOOKUP_ELEM(0xc, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000002c0)=""/189}, 0x18) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x10000) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000480)=""/217) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000a00)=""/4096) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 22:38:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x10000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:58 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0xfffffffffffffffe, 0xfffffffffffeffff) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:38:58 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x700, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{}, {0x20, 'pcbc(aes)\x00'}, {0x20, 'skcipher\x00'}], 0xa, "a5ca7608b680409ee4603930005b14e2c494afd44604a6eb12d675fb794c9ff8958f6f8f7795bbfe8cfde772d73a1e30ec248ad44495421e7bb7e82c77ff56174270e9548d80fcbc782fc0ea509d16d51c05362c89b89d49c80f981642db09ea10d7f22fd69d80599ceaf30d4c33b189"}, 0x91) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:59 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x8001, 0x1f, 0x5d6d912d, 0x8000, "39a68a512af026932d4c4e7ced75ed3ab96e73ce14bb39be2b8780ccd78fb78e"}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000240)={0x6, 0x956, [{0x8000, 0x0, 0x3}, {0x4000000000000000}, {0x8, 0x0, 0x9}, {0x5, 0x0, 0x6}, {0x101, 0x0, 0x100000000}, {0x8921cda}]}) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000200)={0x5, 0x5, 0x80, 0x101, 'syz0\x00', 0x9}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000002c0)={0x0, @loopback, @dev}, &(0x7f0000000300)=0xc) 22:38:59 executing program 1: r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x6e) ioctl(r0, 0x6, &(0x7f0000000280)="bb80b4d4cf10d7a4e21d0c8479510121e956328d57f94486a1003e1cc1b657992dcfa31bd62947078b3ec11a1bceb92d039966c32b93018240f25fb65051c3a8e4a5e165278dbdef4a2ce337568b4dedd7fbe8246061e450f81124f1c7d21b08e3f6bb") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x800) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, r4}}, {@privport='privport'}, {@privport='privport'}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={"6c6f000000000400000000000000db5c", 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x28, 0x13, 0x205, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKMODE={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) 22:38:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x1, {{0x2, 0x0, @multicast1}}}, 0x88) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x4400, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) 22:38:59 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:59 executing program 4: r0 = memfd_create(&(0x7f0000000180)='security;vmnet0\x00', 0x4) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x4, &(0x7f0000000100)=0x2) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000140)=0x2, 0x4) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000000)='./file0\x00') 22:38:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000040), 0x4) accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="8a00000009000000", 0x8) r2 = accept$alg(r1, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:59 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab4f3fec94248c32e27d04000000168a", 0xffffffffffffff33) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'ip_vti0\x00', {0x2, 0x4e23, @remote}}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200400, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000200)={0x5, 0x6, 0xb, 0x1, 0x0, 0x9}) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) [ 1672.057810] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 1672.068820] bond0: lo is up - this may be due to an out of date ifenslave [ 1672.089404] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 1672.100438] bond0: lo is up - this may be due to an out of date ifenslave 22:38:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r3, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000002fd8)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r4}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x1, 0x0, 0x0, {0x77359400}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "cbb11c6a179e075c"}}, 0x48}}, 0x0) sendmsg$can_bcm(r3, &(0x7f0000011000)={&(0x7f0000000180)={0x1d, r4}, 0x10, &(0x7f00000001c0)={&(0x7f0000012f80)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b851e646fbc66287"}}, 0x48}}, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r5 = socket$inet(0x2, 0x3, 0x2) getsockopt(r5, 0x0, 0xd0, &(0x7f0000001400)=""/203, &(0x7f0000000040)=0xcb) 22:38:59 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR64, @ANYRESHEX=r0], 0xffffffffffffffce) dup2(r0, r0) 22:38:59 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:59 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f0000000000)=0x4, 0x7f6) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:38:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x200000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:38:59 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x80, 0x80800) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @broadcast}, &(0x7f00000003c0)=0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x101300, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000001c0)=0x1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000005c0)={0x0, 0x1000, "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"}, &(0x7f0000001600)=0x1008) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000001780)={0x5, 0x79, &(0x7f0000001700)="4ceef5fe9458e19888ec60055279b945499af3d363c7905e579f84a0b666d990335742dbc1698957351dc8fcedbba0a44fcb1d89d0fb6257fde574e1a5e1883fb7b761a14c868df1f7c86301fd9aec81142c494a559b85c5c0895cbe619aa29c61b32107fc51e55c8e2da93c5cefa339b0caf79b13d6ab8117"}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000440)={r3, 0x2}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @loopback}}, 0x0, 0x245d}, 0x90) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000001680), &(0x7f00000016c0)=0xc) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000001640)=0x5) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="e0b5e9fe0797a976ba2df0bc2a84992837fd", 0x12) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec9424a732e27d04000000288a", 0x29e) socket$inet6(0xa, 0xf, 0x7) r5 = accept$alg(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000400)=0x20, 0x4) recvmsg(r5, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000000)=""/83, 0x53}], 0x1, &(0x7f00000017c0)=""/123, 0x7b, 0x1000000000000000}, 0x0) 22:38:59 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xfd6000000000000, 0x2060c1) sendmsg$alg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="e43b667851193dca2e765f2bc3d8127810c04723b597a19b1ce677130f6c322448c65a8920e4a2d67f71e16a63c882fc7526408b60dd7ce25252ba0cb36db9b509cb24c376e75e84f692d33f9a4f99c22aae757847ab7df432cfdd8c03f361b717e1509dc7a5c10401497ccdf8ac76dd96990c63eb9770535af76805d3b5c4426c7a885b972f8d7901a73b78b814137e3c3d527e7c2bea33280261272199866d5d7eab75abf658939e7ffbc1e1a91aec69ee4bb616037b8b585d547060d9e7fb0ebd2470c382111fec13a1bba5c62226", 0xd0}, {&(0x7f0000000300)="3ecc63c912caacc95bee2ab3b9e29f399381d28617a0fbd206d1503096544b2655c9a74b9a94803e213abccf901c1030546fa3257cf672d296e45690ce2015c17486a03eb23a9ecebed59d71d0bd0283001638b8f3e7b016d3f4f760f46f835bd780883befe53f41507043b3f89cfc3f02d1f06dced83ff2a94718aa5421b5c01c6acc0df9ccdfabeaa595b13dea37d04e29176938ea0a512e7ba6429f163630b017b746e0d805431bff2c9c7b8445e5c97af88506c580ced126ab5c62c8f9acb42a5a73f389f1f0671435ac280b07ef", 0xd0}, {&(0x7f0000000600)="c08e1df5bf3eaa45651432221d7bdee27e2920c81cafc7b3f68a807abde82bef7850549a140234077e5821eb7edba9cad722b7a2e99173dc526fde1891476fe926afcec4fc5742d92300b4cea6b9588b01fd563b15eefd710df9cc4956a922056b744b7c58dac895eee538c47d7231c0eb09225c7cc034ecc6c04c2f7b00039d313644c0cdfe75cf7283c54c59a41ce0a48889d5c6ee39b63dcfbea5d71249b5a74ea771cdbbd1988193ec9939dcc7540e3f6e7b7914e630e24a7b395c1b386d840ad727433fd7ad7ea8294dab7ef404c1b805", 0xd3}, {&(0x7f0000000700)="82643ee7d867e8dc91b9d1fc5a1c5f49e6ad7ec8ae99f1aa85702a57746858173ada859464116c941e6f2b12b8f8e91cc4300264ce6f53b97c68467f3e834fc49dcbae39c7cc49046e18a688402e2212987dbf606d681714ca4c1687e9a3af917c0707bc439b8d65063640f9659bb84a240a2cf165ee1b55e3c6eb1410e3f6c65d7f6373aa6d124c512f04825a91f5bb10b0df1b27e53638a25f3809e700a4daad4a286ed6e04781a2e3f443fc280f6f1e7bd9b3e8e6acffb9cd66674301f18928eda0832c656585ed26ef66bb2985a8", 0xd0}, {&(0x7f0000000800)="89e7d4230acb2cdbf10142e228afeef58e6711b0fdc98e4b6b7a8a36e04d10f93dc0b06b90fbd0a2d9ab364475f50114741e4e662cd1ab952cbcb49fb56ba4765b9edc48eb43b411410ceb3f5ca09a57f132c04b9531ad576197254da74bc082f230e885c72cb0883c380b85d795066ac5b3a2b9a62408a67fb0b7288da0f31871f0d8dd037ab486d0ec691833652e97aa5cdcf1aefcde44449c8dae237d62a3b3641f0c953a1a3190b4ecef8da9b1383fd91a71f60a54b7867a3105a23571a3", 0xc0}, {&(0x7f0000000400)="a6cd8b8d2b34ae2da223ada583c4a76a9ca2a31e6391d8885d8114a60eb4c9818fc15e222a6cba16fb9f11a1e3facd48910178f36fa3f3163508fd49cb0210a037fa0c1ede7928edbdf73e73a53fcd82b31d7ab4ed3247654cbf3b027883e373a0d52e70fa4f37749de7b2a181fcc0fd0ddfe691fe6ed30f", 0x78}], 0x6, &(0x7f00000008c0)=[@iv={0x80, 0x117, 0x2, 0x6b, "d187f7e49bc0d1ee8c39b4458a66a3a45bb42a5d811ffd8d69b990b45d0c177233d8851f598471f80165a106a0c7bc32f1643dab21e2e2651e0c471032c8176cb4e86eddef6525180c6738b50cf90f0431004a58c1b9943385822a09c8621a13ac5f58f5cd9c336d089cb9"}, @op={0x18}], 0x98, 0x40000}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ab4f3fec94248c32e27d04000000288a", 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x300000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)='/dev/ashmem\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000000)=""/82) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000100)=0x1, 0x4) 22:39:00 executing program 1: r0 = socket(0x1a, 0x1000000000805, 0x2000000000000000) getsockopt(r0, 0x114, 0x271b, &(0x7f0000000100)=""/13, &(0x7f000033bffc)=0xd8) socket$inet6(0xa, 0x3, 0x5) 22:39:00 executing program 4: r0 = memfd_create(&(0x7f0000000400)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) flock(r0, 0x8) fsetxattr(r0, &(0x7f0000000240)=@random={'os2.', "2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828"}, &(0x7f0000000000)='\x00', 0x1, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) accept4$llc(r0, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000040)=0x10, 0x807fe) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:39:00 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0x2, 0x9, 0x4}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000240)={r4, 0x1f}, 0x8) fanotify_mark(r2, 0x40, 0x9, r1, &(0x7f0000000280)='./file0\x00') sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() r10 = getegid() getgroups(0x3, &(0x7f0000000540)=[0xee00, 0xee00, 0x0]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f00000006c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) fstat(r1, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f0000000800)=[r5, r6, r7, r8, r9, r10, r11, r12, r13, r14]) 22:39:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:00 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000580)=""/83, 0x1c}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x40004) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000140)) mmap(&(0x7f0000871000/0x2000)=nil, 0x2000, 0x4, 0x2000000001010, r0, 0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000040)={{}, 'port0\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000180)={{0x3, 0x7, 0x1, 0x7, 'syz0\x00', 0x10001}, 0x0, [0x8, 0x4, 0x1ff, 0x9, 0x9, 0x9, 0xbaf5, 0x9, 0x8000, 0x7ff, 0x7, 0x6, 0x6, 0x0, 0x4, 0x5, 0x80000000, 0xfff, 0x2, 0xffff, 0x8000, 0x3, 0x3, 0x113041c1, 0x1000, 0x200, 0xc67, 0xfffffffffffffff7, 0x5f, 0xb9, 0x100, 0xfffffffffffffffe, 0x2, 0x6, 0x7f, 0x3, 0x5, 0xfff, 0x9, 0x7, 0x10000, 0x7fffffff, 0x1, 0xca14, 0xffff, 0xf5, 0x98b6, 0x7ff, 0x20, 0x5, 0x7fff, 0x100000000, 0x8, 0x9, 0x8, 0x1000, 0x7, 0x0, 0x5, 0x7, 0x3, 0x1, 0x8, 0x9, 0xffff, 0x1, 0x1, 0x1, 0xfffffffffffffffc, 0x4, 0x1ff, 0x976, 0x20, 0x7, 0x3, 0x172, 0x7, 0x4, 0x3, 0xfffffffffffffffc, 0xffffffff, 0x2, 0xfa, 0x20, 0x20, 0x0, 0x7, 0xfff, 0x0, 0x20, 0x1, 0x1, 0x0, 0x9, 0x4d, 0x6a3, 0xabc, 0x3ff, 0x101, 0x7fffffff, 0x5, 0x1, 0x6, 0x2, 0xfff, 0x2018000000000, 0x0, 0x5, 0x8, 0x81, 0x8, 0x5, 0xfff, 0x2, 0x80, 0xfffffffffffffff7, 0x7fff, 0x200, 0x8, 0x4, 0x0, 0x8, 0x3862fc2f, 0x2, 0xfffffffffffffffd, 0x6, 0x7, 0x7], {0x77359400}}) 22:39:00 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) readv(r1, &(0x7f0000000480)=[{&(0x7f0000000000)=""/43, 0x2b}], 0x1) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) ioctl$int_in(r1, 0x80000040045010, &(0x7f0000000140)) 22:39:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0xa) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x20002, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000200)={0x7, 0x5, 0x3ff, 0x0, [], [], [], 0x8000000000000000, 0x8, 0x18, 0x1, "b17de7ae3d8c1b041cfd777f42d356b1"}) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000040)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-des3_ede-asm\x00'}, 0x58) 22:39:00 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:00 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x3, 0x3ff, 0x4, 0x2, 0x15}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000002c0)={r2, 0xfff}, &(0x7f0000000300)=0x8) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000380)) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000340)={0xb3b3, 0x5, 0x9, 0x0, 0x9fe2, 0x3, 0x401, 0x1, 0xad, 0x7, 0x9e36, 0x3, 0x0, 0x3, 0x63698669, 0x9, 0x3f, 0xffffffff00000001, 0x6}) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:00 executing program 4: r0 = memfd_create(&(0x7f0000000140)="2d42b37aa0cd254e49c56aba857070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea9894363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db20180000000000000a50834d6fe370fe7d924ce20ab4e90f2cd7ab828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x101, 0x3}) 22:39:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x200, 0x80000) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000340)=r3) r4 = dup3(r1, r1, 0x80000) getsockname$inet(r4, &(0x7f0000000240)={0x2, 0x0, @multicast2}, &(0x7f0000000280)=0x10) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40000, 0x0) getpeername$inet(r5, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10) 22:39:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x2000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280), 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f00000009c0)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x7fff, 0x1, [0x80000001]}, &(0x7f0000000280)=0xa) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000002c0)={r2, 0x80000001}, &(0x7f0000000340)=0x8) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x200000000001}, 0x50) umount2(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000380)=0x3) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x200400, 0x0) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000180)) 22:39:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x700000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:00 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) ioctl(r0, 0x684e, &(0x7f0000000000)="3b7e21e4b7baaedf857ef0743ac0648c1d61f4d819d88a8870d4766d") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:00 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:39:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) sendmsg$nl_crypto(r1, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="00010000110000042abd7000fddbdf25647262675f70725f686d61635f736861310000000000000000000000000000000000000000000000000000c7873a535b449f9bfa1174000000000000000000000000e1ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000400000000000000000000080001005b760000080001008000000008000100400000000800010001010000"], 0x100}, 0x1, 0x0, 0x0, 0x800}, 0x4040090) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) r2 = semget$private(0x0, 0x3, 0x200) semctl$SEM_INFO(r2, 0x3, 0x13, &(0x7f0000000200)=""/217) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480), 0x258, &(0x7f0000000100)=""/123, 0x7b}, 0x0) getgid() 22:39:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x200, 0x80000) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000340)=r3) r4 = dup3(r1, r1, 0x80000) getsockname$inet(r4, &(0x7f0000000240)={0x2, 0x0, @multicast2}, &(0x7f0000000280)=0x10) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40000, 0x0) getpeername$inet(r5, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10) 22:39:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r2, 0x200}}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:01 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) fstat(r1, &(0x7f0000000000)) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-avx\x00'}, 0x58) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x40000, 0x0) bind$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e20, 0x1, @mcast1, 0x8000}, 0x1c) 22:39:01 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000000)) 22:39:01 executing program 1: r0 = socket(0xa, 0x3, 0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000040)={'ip6gre0\x00', {0x2, 0x4e21, @loopback}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a2, &(0x7f0000000000)={'veth0\x00', 0x800000}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) 22:39:01 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000200)) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:01 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000040)={0x0, 0xfffffffffffffff8, 0x30, 0x1f, 0xfffffffffffffffb}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000240)={r3, 0x3}, 0x8) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000280)="ba660186da33cc281b92374e0bf93275cfa02a464905d36cd4dc62", 0x1b}, {&(0x7f00000002c0)="59ed0c59937d434fea6c63dc717a7a38dfc2aa4e7a7334c7addba6c40b45be0f233f9fa21862eda22eb841bde3f94ab81ddbed00b867a8fc577437ee69f47bb32dbad6f6c8b6e023a24964a06b625ece2719dffce53062b9504aa754982c2670aac9211735df0cf42874c62f5ba4cc831f5179d42e2d80f6705f9db9d95c9ff1663601f242d28d90e9d8d9da7373493bc3d996acfe1a11425c7823d97289ddca34c01b9c3bba5bc7e1488e51a71fd32b5b2fff5e32a55b398cba14aa62c6b99adbe24df03dcff1079d026c72852188bf364fab7cb184139d700a2c", 0xdb}, {&(0x7f00000003c0)="1d43f15dc921cded3feb3c1170c8bfbe902c748b162fd30ba2e804290250942d4ed6b54ac0210702b91c9138f35f8e9236d56e91e33577df13f30175f0fd8e414f471a3ae64259e22d224a6e1d2c30393fa6399f3cf2f6e3af4c0df43ef99e5851e434bfc108", 0x66}, {&(0x7f00000007c0)="cba87ee66110982e68a223cfb653ad685ab2f0c24875bcd77f2d4ec5bf25e7b5931c115202c53efc364249f2257c2b9971ed1281fb22146a278e70c4c9ae27227280fb018f6ec80516cf4b7e15a06af169f25841d6f518b3e6a5fa3069a2b3e87c3cf5f91727025ff1795205f424a8b99daf33e0b9d217c27b9540eb50bece7953fdaaf4c6590e3dff799252ad7729a0dbc3eb1645417c8d7e5c13ed9501ec0f89e419e43c81a9349667ce", 0xffffffffffffff94}, {&(0x7f0000000880)="f11ec538305be37440312337d5b338cc964ff07beb1692aa9aec6df4f2e4fa79ed36b3413a479333dafab6819091efd7b920ed8442000720cb40920716f3d608261215eb1593c86459a8cd53886cb00989f7757f7d8c66fc54db1297aa1f2abbf758f86a897fd91c598bd5a75ddd663491a8cff215ae525235edfb8d43fc11dc0fe62bacaa9c5d2625e73651b80c106f0da05ae95bcaedf8c6d084ba45658992c7948e87141ccbc2b8050db4dfab4bb2ca668fcb6ed770387dd7bd81c9fd05550b6820d28d94a1a576607b11b5cc130f6588e44a358c3fa16bbf2e8661241b270c5988c691", 0xd7}], 0x1, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:01 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x2000, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x10001, 0x0, 0x6, 0x6, 0x0, 0x4d1c, 0x8000, 0x8, 0x0, 0x800, 0x9, 0x7, 0x4, 0x7, 0x3, 0xc7, 0x3, 0x0, 0x3f, 0x7, 0x7fff, 0x1ff, 0x80000000, 0x1, 0x1, 0x800, 0x4, 0x401, 0x7, 0x4fd7, 0x80000000, 0x0, 0xfffffffffffff80c, 0x4, 0x422, 0x80000001, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x7fffffff}, 0x0, 0x4, 0xfff, 0x7, 0x18c0, 0x40, 0x5}, r0, 0x10, r1, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) 22:39:01 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000240)={r3, 0x100000001, 0x6, 0x6}, &(0x7f0000000280)=0x10) 22:39:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x3000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="288a000000e587000000000000000000f28f35b829e6d5c19abdb3f468e22fecca899733f0b8e31ea9878da8b66ebcb4b77efa4551aa9b6674484762d7b49121f7269e41bd0f8ce01586b9a964a23af1fca3b85ae139940647a8d989876609f01dffda79e64dbca69edc17ae1fa1bb871b4301539c79d1194d205e67e6aad68673891113b09df36f2df6b05c15c1afd3e9703c7876d770bfd993311b8daf37cebe81ff4b", 0xffffff67) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x100000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:01 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:39:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0)={0x7fff}, 0x4) r3 = memfd_create(&(0x7f0000000200)='reiserfs\x00', 0x2) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f0000000280)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fd9000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000100)="d350d3470f01bebf9f0000650fc759b048b8a2940000000000000f23d80f21f835400000700f23f8b9cb0800000f32430fbaf40c0f38ca5ff30f013500f0ffffc422b528b20040000066f00013", 0x4d}], 0x1, 0x0, &(0x7f0000000200), 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_INTERRUPT(r3, 0x4004ae86, &(0x7f0000000440)=0x7fff) ioctl$TCXONC(r2, 0x540a, 0x5) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r3, 0x4008ae48, &(0x7f0000000380)=0xd004) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f00000003c0)) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f00000002c0)=""/147) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000240)=0xe, 0x800) 22:39:01 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x890f, &(0x7f0000000040)="0a5cc80700315f857150782147c0fefa491e7b50635f78b4d0d147ff46e165d5b05744381edb850ca6fe6031f60ae9ce76bf3aa191d0c5c512abe42bc203116681aef1db77e4388860e6067d416346e8d193709b5a389cc798f9e45611f5a5a76423892ab9e65eedbfff450b5fa6aa7ff43b6ad4b1dc5c6ac57137ef412d622c25520a270054bdfc14e2790ba6720ee54f3a683abeac642cbce65597153b2f8d4b69f700000000000000000000000000") keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200000, 0x0) accept4$packet(r1, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000007c0)=0x14, 0x800) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000800)={@loopback, 0x31, r2}) ioctl$TIOCNXCL(r1, 0x540d) 22:39:01 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(r1, &(0x7f0000000200)="62ec834da1b1e1c823d0fbd4df4653effa1ead208d5bb466367d6cf2f353c9f0cd7d34cae8192900102af4e5a27b88ab44da95085ac4601157f1e89e6d545775313749543881d1ab3f5fa598b3580373c3d3c34fdd17614de0a8607a8c39f71b1c015c888f04e067f570cf544a9752a6cb76d812d3cbba53554afec37e408d46607bf54cfd785a85483a286ff569be9223ee86ad", 0x94, 0x4000, &(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/audio\x00', 0x290000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x1c, r3, 0x311, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x776}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e21, 0x8001, @local, 0x6}, {0xa, 0x4e22, 0x6, @mcast1, 0x7}, 0x88, [0x80000000, 0x7fffffff, 0x3, 0x1, 0x9, 0x4, 0x5, 0xfffffffffffffff7]}, 0x5c) r4 = accept$alg(r0, 0x0, 0x0) recvmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x2000, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r5, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, r6, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x24, 0x16}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4004080) 22:39:02 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000000)='./file0\x00') 22:39:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="d3ab27191a01002356ba602dff05000b", 0x10) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600000000000000000000003800000000000000000000000000200000000000000000000700000009b8eee3d5c0f64135a2f878d57cb96458d70f1f71d314ded5108df33f43572552295706f65846818d33a018f25e7693bcb0473bc9a0fc67032ec3bfc1f5cfe101000000fa"], 0x70) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000003f40)=""/190, 0xbe}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x228, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 22:39:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000200)=ANY=[@ANYBLOB="040000000000000008000000d7530000000000000000004003000000d7140000010000800800000000000000070000000400000006000000ff0fffff09000000000000000b0000c00200000002000000010100000002000000000000000000000000000000000000"]) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) [ 1675.083878] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "ʲ!`1nEDL4&H0$Il PuS=޴őv-<]?}l0x0, 0x7, 0x4, [0xb737, 0x4, 0x7fffffff, 0x101]}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000540)=@sack_info={r1, 0x7, 0x5}, &(0x7f0000000600)=0xc) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @multicast1}}, [0x40, 0x8, 0x3, 0x6, 0x101, 0x4ba, 0x5, 0x1ff, 0x100000, 0x3, 0x4, 0x4, 0x3ff, 0xfffffffffffff000, 0x7b43]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000380)={r5, 0x4}, &(0x7f00000003c0)=0x8) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000200)={0x81, 0x0, [0x46, 0x100000001, 0x97, 0x720]}) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000000008912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x71, &(0x7f0000ad2000), &(0x7f0000000080)=0x23c) 22:39:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="a7925d11e5f8d6493b7bc76d6a3f4bebc315439500e22b63812e96a0716c5114f51f521353fec8f964699d374a118f61b32adb736c9e833edd7f18e004820eed15370c75505ba15a00674f973354e1b561bf0bc22947772536a2cd133a1bbda550e629", 0x63) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_getaffinity(r1, 0x8, &(0x7f0000000080)) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x1c, 0x27, 0xaff, 0x0, 0x0, {0x2}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 22:39:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x700, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:02 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) 22:39:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x10000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:02 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000140)={0xfff9, 0x1b, 0x1, r1}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000040)=0xfffffffffffffff8) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x3) 22:39:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x244a00, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000380)={{0x6, 0x3d}, 'port0\x00', 0x2b, 0x840, 0x40, 0x80000001, 0x3, 0x2, 0x0, 0x0, 0x4, 0x5}) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x2, {0xa, 0x4e23, 0x40, @empty, 0x7ff}, r3}}, 0x38) r4 = semget(0x0, 0x3, 0x100) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000440)={0x1}) semctl$GETZCNT(r4, 0x3, 0xf, &(0x7f0000000000)=""/27) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r0, 0x0, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000300)={0x1, 0x400, [{0x3f, 0x0, 0x9f}]}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000004c0)=[@in6={0xa, 0x4e21, 0xef, @remote, 0x7}, @in6={0xa, 0x4e23, 0x4, @loopback, 0xe1ce}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x7}, @in6={0xa, 0x4e21, 0x0, @ipv4, 0x80000000}], 0x70) recvmsg(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x1, &(0x7f0000000200)="0a5c390670000000000000") r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x11) r2 = syz_open_procfs(0x0, &(0x7f0000000700)="6e65742f697076365f726f75746500a29e8f64ba83da5ff49aee56e797447969e6d9d05d5a9caa999c5f403f53fa21658b3f98a093bb1c274232b43b64bb6e64f9d5260e6fcb8bbe8008b6e826310e5740fc497b8e7701842d98026faab3e2b1a69c715b8ee8bf6628b17c48fd3933bda549010c0741e0604a70a4d2152174b71b555c034b9605578f5050542aa35e7d7482ab0f0db1d37530690fcbe2d3cbd8a63a612101b912ac141f7e2fd5c140b1e95bba3d65024365b3838729256a7a78ae3b9e9156d885f6fce898d76e83dc7019c16ab8e66f55e4c10d74ca783bf63080cb22c3d0e9f354d57bb1111dd0be060000000aaa6094a5f8938751b60b50d6bde08b583f46b4eff2b6f842765ad9b7dcb18d4a7126bc90fa464128d8d04535b0b226aeb8720fdbd6bef663af017339a9e77f292f2bd345e3c32823fee242a4aa1ba93b1e0623eed95f6928071de31811198d44a2d81b28180bbe7a5802c668837be608b7d2f0f6453d19d4873aebf52e2f7cbee4d10632c12d665af044184126c24c230d698e0e2224b505f196118ccee4f3dedb2b36fe5a21398bcf097caad6e85aeae62b1bc07014b0c7bce7e8f5cef2ec1429f88e03d71eefc5711242de6ab430c73e76c5f609a1fd0d5719512ed9d881c81d64041a6118d961b9f16ea90257ab9e4414a3ca30014627baa25e882008a0208eb0d4f194c318435fc4085869f7da31763967140f2271f6652d2c08f34132775019a7648e76df5f8290a1c442944ad8c5995dbd37bee29e4fcfa657bfa98e3d46bb17e5d25f2b1f0ddb3ba9423af0c91af45188a64737") syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) sendfile(r1, r2, &(0x7f0000000100), 0x100000000004c3) 22:39:02 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x411, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) socket$inet_udp(0x2, 0x2, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:39:02 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) mlock(&(0x7f0000007000/0x4000)=nil, 0x4000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e24}}, 0x1ff, 0x2}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2, 0x9, 0x30}, &(0x7f0000000140)=0xc) remap_file_pages(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) [ 1675.942021] ion_buffer_destroy: buffer still mapped in the kernel 22:39:03 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x80, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000002c0)) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) poll(&(0x7f0000000300)=[{r2, 0x8}, {r1, 0xc412}], 0x2, 0x5) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) write$P9_RSTAT(r3, &(0x7f0000000200)={0x58, 0x7d, 0x1, {0x0, 0x51, 0x80000000, 0x5, {0xa8, 0x2, 0x8}, 0x900000, 0x7, 0x7, 0x40, 0xa, 'pcbc(aes)\x00', 0xa, 'pcbc(aes)\x00', 0x0, "", 0xa, 'pcbc(aes)\x00'}}, 0x58) 22:39:03 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000280)={0x0, @local, @broadcast}, &(0x7f00000002c0)=0xc) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000300)={@remote, r2}, 0x14) r3 = accept$alg(r0, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x501000) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="66b9800000c00f326635000800000f300f2325363e0f01cb66b9800000c00f326635002000000f30018c448b2e0f0171860fc72cba4200ed67f26cd0bf9f30", 0x3f}], 0x1, 0x0, &(0x7f0000000300), 0x0) syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f0000000800)={[{@gid={'gid'}}]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) r3 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x100000000, 0x80) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000380)={0x5, 0x1}) r4 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f00000002c0)=""/87) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:39:03 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f00000003c0)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc05c5340, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"}) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000013) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xff, 0x541200) setsockopt$inet_mreqsrc(r3, 0x0, 0x28, &(0x7f0000000140)={@multicast2, @remote, @multicast1}, 0xc) 22:39:03 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f00000002c0)="d4e79a4f2a70e0b2d842f485865de12c982fd8b265c6a3006cad317bf38fb722c4d637538a02b39a6a2f42882ce8a99bc32605f78647e04740351834a79f0d4afc", 0x41, 0x200000) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xffff, 0x80000) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0)=0x1, 0x7f8) r1 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0xffffffffffffffff, 0x0, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r1, 0x0) tee(r0, r0, 0x100000000, 0x5) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x20800, 0x0) unlink(&(0x7f0000000100)='./file0\x00') 22:39:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x0}) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) [ 1676.365234] hfsplus: unable to find HFS+ superblock [ 1676.488715] kvm [19892]: vcpu0, guest rIP: 0x20e disabled perfctr wrmsr: 0xc1 data 0x800 [ 1676.511017] kvm [19892]: vcpu0, guest rIP: 0x20e disabled perfctr wrmsr: 0xc2 data 0x0 [ 1676.526274] kvm [19892]: vcpu0, guest rIP: 0x20e ignored wrmsr: 0x11e data 0x0 [ 1676.540872] kvm [19892]: vcpu0, guest rIP: 0x20e disabled perfctr wrmsr: 0x187 data 0x800 22:39:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:03 executing program 7 (fault-call:6 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) [ 1676.705883] FAULT_INJECTION: forcing a failure. [ 1676.705883] name failslab, interval 1, probability 0, space 0, times 0 [ 1676.717374] CPU: 0 PID: 19925 Comm: syz-executor7 Not tainted 4.18.0+ #194 [ 1676.724402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1676.733765] Call Trace: [ 1676.736404] dump_stack+0x1c9/0x2b4 [ 1676.740044] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1676.745272] should_fail.cold.4+0xa/0x11 [ 1676.749364] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1676.754485] ? graph_lock+0x170/0x170 [ 1676.758286] ? print_usage_bug+0xc0/0xc0 [ 1676.762362] ? find_held_lock+0x36/0x1c0 [ 1676.766435] ? __lock_is_held+0xb5/0x140 [ 1676.770533] ? check_same_owner+0x340/0x340 [ 1676.774865] ? rcu_note_context_switch+0x730/0x730 [ 1676.779807] __should_failslab+0x124/0x180 [ 1676.784053] should_failslab+0x9/0x14 [ 1676.787854] __kmalloc+0x2c8/0x760 [ 1676.791413] ? sock_kmalloc+0x156/0x1f0 [ 1676.795406] sock_kmalloc+0x156/0x1f0 [ 1676.799227] ? __sk_mem_schedule+0xe0/0xe0 [ 1676.803487] ? mark_held_locks+0xc9/0x160 [ 1676.807692] af_alg_alloc_areq+0x83/0x280 [ 1676.811865] ? alg_accept+0x60/0x60 [ 1676.815495] ? trace_hardirqs_on+0xd/0x10 [ 1676.819659] ? __local_bh_enable_ip+0x161/0x230 [ 1676.824353] skcipher_recvmsg+0x354/0x1220 [ 1676.828611] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1676.834229] ? skcipher_bind+0x30/0x30 [ 1676.838186] ? move_addr_to_kernel.part.18+0x100/0x100 [ 1676.843496] ? security_socket_recvmsg+0x9b/0xc0 [ 1676.848260] ? skcipher_bind+0x30/0x30 [ 1676.852184] sock_recvmsg+0xd0/0x110 [ 1676.855917] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1676.860953] ___sys_recvmsg+0x2b6/0x680 [ 1676.864955] ? ___sys_sendmsg+0x930/0x930 [ 1676.869121] ? lock_downgrade+0x8f0/0x8f0 [ 1676.873285] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1676.878832] ? proc_fail_nth_write+0x9e/0x210 [ 1676.883350] ? __fget_light+0x2f7/0x440 [ 1676.887337] ? fget_raw+0x20/0x20 [ 1676.890800] ? find_held_lock+0x36/0x1c0 [ 1676.894875] ? kasan_check_write+0x14/0x20 [ 1676.899121] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1676.904074] ? wait_for_completion+0x8d0/0x8d0 [ 1676.908701] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1676.914248] ? sockfd_lookup_light+0xc5/0x160 [ 1676.918742] __sys_recvmsg+0x11a/0x290 [ 1676.922631] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1676.927214] ? __sb_end_write+0xac/0xe0 [ 1676.931197] ? fput+0x130/0x1a0 [ 1676.934487] ? ksys_write+0x1ae/0x260 [ 1676.938311] ? ksys_ioctl+0x81/0xd0 [ 1676.941945] __x64_sys_recvmsg+0x78/0xb0 [ 1676.946015] do_syscall_64+0x1b9/0x820 [ 1676.949899] ? finish_task_switch+0x1d3/0x870 [ 1676.954414] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1676.959343] ? syscall_return_slowpath+0x31d/0x5e0 [ 1676.964266] ? __switch_to_asm+0x34/0x70 [ 1676.968323] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1676.973701] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1676.978556] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1676.983760] RIP: 0033:0x457089 [ 1676.986960] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:39:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:03 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x26, "dcc9d68b7a445562ddf1916396506b41a7c994fdae20efd3f480a02bdb06c9834f607ba4f080"}, &(0x7f0000000200)=0x2e) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000240)=@assoc_value={r3, 0x7fffffff}, 0x8) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x44000, 0x80) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000200)={0x2, 0x3, 'client0\x00', 0x1, "6ba1b4e67cb2ecf7", "d8af3e1e411d6a98e253b841127475600d849c2e0a023316e7c5e0affa286696", 0x0, 0xab00000}) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:03 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x40082, 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') [ 1677.005864] RSP: 002b:00007fd95a928c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1677.013573] RAX: ffffffffffffffda RBX: 00007fd95a9296d4 RCX: 0000000000457089 [ 1677.020843] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 1677.028110] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 1677.035387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1677.042677] R13: 00000000004d3818 R14: 00000000004c84e6 R15: 0000000000000000 [ 1677.075620] hfsplus: unable to find HFS+ superblock 22:39:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = socket(0xa, 0x3, 0x9f) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000000)={r1, 0x100000000, 0x4, "bee06e30b85a10805627856ccd070cc029d60998b33a36c86905"}) r3 = accept$alg(r0, 0x0, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:04 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x400, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000600)=@routing={0x7f, 0xa, 0x0, 0x401, 0x0, [@ipv4={[], [], @rand_addr=0x4}, @remote, @mcast1, @mcast2, @remote]}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000680)) sendmsg$alg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="2a6935160c8ca8c3b48aa6ce3a42b463aa56e58f162079d46fbc70bbc3e7ec68369d28baf1d3649fccbed9545b238be756279077acaaeb86c77496b22800603fb447fb2c44cbed1ef10b351dd13a5f5a472b6fa8cb9b1b17e044d8b2cc6e32c84008fa8f16241a0b41ebef7d94b35d7a9743a45a985d02edf3af1b5b", 0x7c}, {&(0x7f0000000280)="fa0e5810dc00dc8224d0eac960bacbf1148f7d4ff77d671d5b20f3631f52128f", 0x20}, {&(0x7f00000013c0)="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", 0x1000}, {&(0x7f00000002c0)="5d3c2d86c002a68d73a5dc4c8e249187f140ce410fa4071cb68e1cd2d914f0e5dbd914df789cc5d7cbf6bfcb2fc888d3d3d739a8680aa9d629325cb24e1f904e5974e1567632d9eb2bae8cd64d4263228a79be72b5aafbc1b593887a7d9c5a1a56fa781cf05314112748c83d396e2ae09e", 0x71}, {&(0x7f0000000340)="6e7fc1d8d71f12f019bd64816ea6e1097abf46d17dbe696e5599ab", 0x1b}, {&(0x7f0000000380)="e697b9683c622badc6f2cd27389aa9757000415d48c804173ba81ad7abb1e2ed5b7c9f4e22ab546f16b5bfd6a4556688d5cf3392f6ce213ffbaee5c39318d69ef3330166cd53578ba7637c44", 0x4c}, {&(0x7f0000000400)="ec645dd28cb4a77ded7ecc28ada461cabd7c3563b0ab653d377f64dcefb3f873bf86a35edbcd7ff9d6ea12262b0e61d0e942dded9a249307e2c26556bb75487b7229159d2712574f48ab264bc65cb558da", 0x51}, {&(0x7f00000023c0)="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", 0x1000}], 0x8, &(0x7f0000000000)=[@assoc={0x18, 0x117, 0x4, 0x8}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:04 executing program 5: syz_open_procfs(0x0, &(0x7f0000000280)='mountinfo\x00') pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) msgget$private(0x0, 0xa4) 22:39:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@filter={'filter\x00', 0xe, 0x5, 0x160, [0x0, 0x20000400, 0x20000910, 0x20000b28], 0x0, &(0x7f0000000080), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'veth0_to_team\x00', 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0xa0, 0xa0, 0xd0, [@cgroup0={'cgroup\x00', 0x8, {{0x7, 0x1}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x3}]}, 0x1d8) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0xb7891e60387e7f1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{0x8}, {}, {}, {}], 0x2217) 22:39:04 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f5) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='./file0\x00') unlink(&(0x7f0000000040)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000240)={0xe000000000000000, 0xffffffffffffffc1, 0x4, 'queue1\x00', 0xfffffffffffffffe}) 22:39:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ddbd646f2e4db9ae6487069991c54d50437f974ec3351bb3c419693b2b686d4003", 0x21) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:04 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8001, 0x42000) setsockopt$inet_buf(r2, 0x0, 0x0, &(0x7f0000000040)="1a8d7ad79d4f3d7530897b41737b", 0xe) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:04 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[]], 0xfffffffffffffe5d) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000100)) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000003, 0x1813, r1, 0x0) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=0xf7) 22:39:04 executing program 7 (fault-call:6 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x8, &(0x7f0000000040), &(0x7f0000000080)) [ 1677.699500] FAULT_INJECTION: forcing a failure. [ 1677.699500] name failslab, interval 1, probability 0, space 0, times 0 [ 1677.710846] CPU: 1 PID: 19986 Comm: syz-executor7 Not tainted 4.18.0+ #194 [ 1677.717882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1677.727259] Call Trace: [ 1677.729880] dump_stack+0x1c9/0x2b4 [ 1677.733538] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1677.738769] should_fail.cold.4+0xa/0x11 [ 1677.742854] ? kasan_kmalloc+0xc4/0xe0 [ 1677.746801] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1677.751917] ? __sys_recvmsg+0x11a/0x290 [ 1677.756001] ? __x64_sys_recvmsg+0x78/0xb0 [ 1677.760262] ? do_syscall_64+0x1b9/0x820 [ 1677.764335] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1677.769698] ? print_usage_bug+0xc0/0xc0 [ 1677.773780] ? find_held_lock+0x36/0x1c0 [ 1677.777864] ? graph_lock+0x170/0x170 [ 1677.781697] ? graph_lock+0x170/0x170 [ 1677.785520] ? __lock_is_held+0xb5/0x140 [ 1677.789605] ? find_held_lock+0x36/0x1c0 [ 1677.793704] ? __lock_is_held+0xb5/0x140 [ 1677.797792] ? check_same_owner+0x340/0x340 [ 1677.802145] ? rcu_read_lock_sched_held+0x108/0x120 [ 1677.807207] ? rcu_note_context_switch+0x730/0x730 [ 1677.812188] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1677.817777] __should_failslab+0x124/0x180 [ 1677.822066] should_failslab+0x9/0x14 [ 1677.825877] __kmalloc+0x2c8/0x760 [ 1677.829438] ? af_alg_make_sg+0x4f0/0x4f0 [ 1677.833707] ? sock_kmalloc+0x156/0x1f0 [ 1677.837706] ? mark_held_locks+0xc9/0x160 [ 1677.841872] sock_kmalloc+0x156/0x1f0 [ 1677.845697] ? __sk_mem_schedule+0xe0/0xe0 [ 1677.849938] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1677.854965] ? af_alg_count_tsgl+0x1bc/0x250 [ 1677.859417] skcipher_recvmsg+0x4ee/0x1220 [ 1677.863698] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1677.869263] ? skcipher_bind+0x30/0x30 [ 1677.873187] ? move_addr_to_kernel.part.18+0x100/0x100 [ 1677.878484] ? security_socket_recvmsg+0x9b/0xc0 [ 1677.883275] ? skcipher_bind+0x30/0x30 [ 1677.887225] sock_recvmsg+0xd0/0x110 [ 1677.890956] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1677.895995] ___sys_recvmsg+0x2b6/0x680 22:39:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:04 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x3ac}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) [ 1677.900004] ? ___sys_sendmsg+0x930/0x930 [ 1677.904199] ? lock_downgrade+0x8f0/0x8f0 [ 1677.908361] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1677.913931] ? proc_fail_nth_write+0x9e/0x210 [ 1677.918463] ? __fget_light+0x2f7/0x440 [ 1677.922460] ? fget_raw+0x20/0x20 [ 1677.925929] ? find_held_lock+0x36/0x1c0 [ 1677.930017] ? kasan_check_write+0x14/0x20 [ 1677.934269] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1677.939222] ? wait_for_completion+0x8d0/0x8d0 [ 1677.943833] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1677.949402] ? sockfd_lookup_light+0xc5/0x160 [ 1677.953928] __sys_recvmsg+0x11a/0x290 [ 1677.957838] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1677.962432] ? __sb_end_write+0xac/0xe0 [ 1677.966440] ? fput+0x130/0x1a0 [ 1677.969730] ? ksys_write+0x1ae/0x260 [ 1677.973532] ? ksys_ioctl+0x81/0xd0 [ 1677.977183] __x64_sys_recvmsg+0x78/0xb0 [ 1677.981273] do_syscall_64+0x1b9/0x820 [ 1677.985192] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1677.990141] ? syscall_return_slowpath+0x31d/0x5e0 [ 1677.995098] ? __switch_to_asm+0x34/0x70 [ 1677.999188] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1678.004576] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1678.009454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1678.014687] RIP: 0033:0x457089 [ 1678.017910] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1678.036832] RSP: 002b:00007fd95a928c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1678.045105] RAX: ffffffffffffffda RBX: 00007fd95a9296d4 RCX: 0000000000457089 [ 1678.052562] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 1678.059844] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 1678.067233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1678.074541] R13: 00000000004d3818 R14: 00000000004c84e6 R15: 0000000000000001 22:39:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:05 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8, 0x101000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="5ddf3f9ba0b7f3853b7ad1ff69e36a394972a3317f3ee397e96bddc9a882bb8c4193a41e04b721ca3d7975b69085fe650837e6ccd45866a7a638e3669de4159affd1867a254fcf70affb3acde23e91e28c2487d12a7dffbb0b0cdc7392c46d048c5be60830774a250ab73691211c4551ae16d465757fa8642628fa135415e2227d78b9d20e31457598c95ce28ca94157aaaeb068741a5760554a2403fb8fdd283dfa847d4bf7e325dffc357422af11a2c1f4220992ef805d12e42dff0de89ceab0428562aee066d4b51efed7f79d27b45d142003446f5162288dbb28934d1b4e082ed21cdc728249", 0xe8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:05 executing program 5: setrlimit(0x8, &(0x7f0000000080)) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x300, 0x0) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000000c0)={[0x0, 0xffffffffffffdc79, 0x2, 0x8, 0x3, 0x0, 0xbf, 0x3f, 0x9, 0x0, 0x8, 0x0, 0xffffffff7fffffff, 0x2, 0x10000, 0x6], 0x1, 0x80002}) bpf$MAP_CREATE(0x0, &(0x7f0000002e40)={0x12, 0x0, 0x4, 0x70, 0x0, 0x1}, 0x27) 22:39:05 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x891a, &(0x7f0000000280)="028f764070000000000000") perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x4, 0x40) clock_adjtime(0x6, &(0x7f0000000480)={0xffffffffffffffff, 0x4, 0x10000, 0x1ff, 0x7ff, 0x7fff, 0x0, 0x81, 0xff, 0x80000000, 0x7, 0x2}) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000200)=""/82) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000080), 0x10) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='[proc\x00'}, 0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000440)) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ad7000)={0x2000000000000183, &(0x7f0000acbff8)}, 0xfffffffffffffe89) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000280), &(0x7f00000002c0)=0x4) bind$inet6(r2, &(0x7f0000807fe4)={0xa, 0x4e22, 0x4}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) sendto$inet6(r2, &(0x7f0000000380), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xffffff76) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}, 0x10) r5 = dup2(r2, r2) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, 0x4}) sendto$inet6(r5, &(0x7f0000ad6fad)='\x00', 0x1, 0x3fffffd, &(0x7f0000000140)={0xa, 0x0, 0xfffffffffffffffc, @loopback}, 0x1c) poll(&(0x7f0000000580)=[{r4, 0x10}, {r1, 0x2000}, {r1}], 0x3, 0xe0) dup2(r3, r2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) 22:39:05 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) fremovexattr(r1, &(0x7f00000003c0)=@random={'osx.', '&keyring(\x00'}) socket$inet6(0xa, 0xa, 0x8) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000400)=0x5, 0x4) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000340)) lremovexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'os2.', '\x00'}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0xc5, "a23f010e437a29e5c79773f982639d8b4bcdee203297aa350f3fb1675f81bdc14143b83a231fbc685aed1ce77732b6062d3e2668b7ca0fca3af91ff9890179fb3aaf9eda8678a2b04f69838dfc2ee461c3e4a3d8b3fbc67a2a917a178706d19957cf61afaad07a28c2a7df6a8353a2227a6428812913fdf654addfde8c5ea3d12eab931a8a8b369433ec245fa93c8d76343b406c07bd201f699099db72972bf6b7b0ac1cfb70b732dcacc91fdf0eb1ce6b20c6944c438c81a1504c434823d20afc86c0f875"}, &(0x7f0000000040)=0xcd) 22:39:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000000)=@ethtool_stats={0x37}}) close(r2) ioctl$sock_netdev_private(r0, 0x89ff, &(0x7f0000000040)="afdd66ef824545ad67fd95347334f750f69771a46d4b33da88f091c41eb44d90c7df") close(r1) 22:39:05 executing program 5: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0xaaaaaaaaaaaac20, &(0x7f0000000200), 0x100004, &(0x7f00000001c0)=ANY=[]) 22:39:05 executing program 2: socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14, 0x80000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d0400beae78ea", 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) setuid(r2) r3 = accept$alg(r1, 0x0, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:05 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) fsync(r0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') r3 = getuid() stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000280)={0xb0, 0x0, 0x1, [{{0x3, 0x3, 0x101, 0x3, 0x4, 0x1, {0x6, 0x8, 0x7, 0x2, 0x2, 0x2, 0x400, 0xd748, 0x3, 0x9, 0xffffffffffffffc0, r3, r4, 0x1}}, {0x0, 0x800, 0x1, 0x3, '&'}}]}, 0xb0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000001c0), &(0x7f0000000100)='\x00', 0x1, 0xffffffffffffffff) keyctl$setperm(0x5, r1, 0x380c0000) clone(0x0, &(0x7f00000002c0)="3fa8473e6ac58232b4ed87d73abe7f55d86383f2469914aaf1b3775b7a026209b08edff4b5c457704e47fae77f378a763bc9626931df77e39f93d1c7d78b213f303a57c9096d0759192a99aacb6f088f11f64f3db94c7ae755a17d6ae463e5da5e88539dfb75", &(0x7f0000000140), &(0x7f0000000340), &(0x7f0000000380)="636036038e47fad98364ec62681c197256585ac50222398264cd9af557da4359b5442796510cb05b4ceca1ad764fe2cea7f4e3cbda40d7f3166a2767e59ca8f9959acfd079da08000000ebaafb3ed02e099909709f15ec4e8633f478e30bbc82") keyctl$get_security(0xb, r1, &(0x7f0000000200)=""/84, 0x54) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) getpgrp(r2) 22:39:05 executing program 7 (fault-call:6 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = getpgrp(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x3, r1}) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:05 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x2000, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x6) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) socket$alg(0x26, 0x5, 0x0) 22:39:05 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) ptrace$setsig(0x4203, r0, 0x9, &(0x7f0000000040)={0x3b, 0xc000000, 0x5, 0x1000}) r1 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r1, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:39:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x9, 0x8800) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000140)="fdd1bdebff09250760dd355bcac2dd3f", 0x10) sendto$inet(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000240)={r3, r1, 0xe4bb, 0xfffffffffffff68b, &(0x7f0000000080)="037f7077e89dabc768cefd712741c6b68cc8896a749dae7c28ccd3f632a49466", 0x100000001, 0xca2, 0x2, 0x101, 0x3, 0x2d, 0x9, "421ee2d490539ed8d50c86b3b387e1410ca04c6bcb753d4d1718d3b0f237ef532317427cbc970d3387cd3a50719d5d8a885e51cf4ecdca0765d409a983ee3c324f8839ccac7156badb0810adcb3aff71df1e63f0c80e62d636a8905305eef2c7d8f5ed34cfa15702459059b0e681a1a477b257eb48fa55c95cd0b6e780f590592a15958db263f70d76c256489f45c66b31715934e9464c9e3a9e535a98da6e6d79854cf7a1e05e8b27"}) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x4) 22:39:06 executing program 6: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x40, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000200)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) fcntl$dupfd(r0, 0x406, r0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0xf4479bb) r2 = accept$alg(r1, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8c00, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)}, {&(0x7f00000003c0)="7eb0a84f45442d47108df2eb494f75035b4f0a258db0e013417e5c911d9124dc782a841654fc0e5f3532850c4038e44c58e73acef26fd3f13ffa293810ac1fb466ffb47334e85e238c821414c2b5a3b8f91564d2311dcef2d189163f21d093b503d0bd5a091ec39064c28938d1bfc2d345f2ce42cb314731d322c9f2d8fccc2101548e6bdea6f36f2e442196cbadb72311b744dcb6d410eb9c55665fb1cd972dd1a32582f6d1", 0xa6}, {&(0x7f00000013c0)="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", 0x1000}], 0x3, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x1) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000280)=""/134, &(0x7f0000000340)=0x86) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000240)={0xffff}, 0x4) 22:39:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1000000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x4e22, @broadcast}}) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:06 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000180)={'bridge_slave_1\x00', &(0x7f0000000140)=@ethtool_link_settings={0x41}}) close(r2) close(r0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCRTMSG(r3, 0x890d, &(0x7f00000000c0)={0x8, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e24, @loopback}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x2, 0x5, 0x2, 0x86, 0x83, &(0x7f0000000080)='veth0_to_team\x00', 0xff, 0x2, 0x6}) r4 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x8, 0x101001) write$FUSE_STATFS(r4, &(0x7f0000000200)={0x60, 0xffffffffffffffda, 0x4, {{0x8, 0x380000000000000, 0x10000, 0xfffffffffffffffd, 0x0, 0x7, 0x10000, 0xbbf}}}, 0x60) 22:39:06 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000000)=0x31) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 22:39:06 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) connect$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x2, @loopback}}, 0x1e) r2 = socket$pptp(0x18, 0x1, 0x2) dup3(r0, r2, 0x0) 22:39:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8001, 0x34040) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x2, 0x1800000000000, 0x7, 0x8, 0x9f6, 0x6, 0x3, 0x69, 0x25, 0x7, 0x3, 0x376}) 22:39:06 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0xa) 22:39:06 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = memfd_create(&(0x7f0000000000)='pcbc(aes)\x00', 0x1f66ec34868d4dc8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x117, 0x3}}, 0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x20001, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r2, r3}}, 0x18) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:06 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) 22:39:06 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:06 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000800)=""/95) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xa) r1 = socket$inet_sctp(0x2, 0x5, 0x84) timerfd_settime(r0, 0x1, &(0x7f0000000780)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f00000007c0)) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000580)={0x0, 0x70, "348a0a693e9f5ed54f4cab6bd586ce2c56bcc97de579059d711c647bd92d14ae643fee253d4bd39cd47b04b81ed4e6f0d68ec4693bfff2262bcce24021f477b671e034cb8b1d6d59863bd15c714408e94047730115cfa1cfbbcd0e6df022afc647385b70528ab10c7b973f0faa309223"}, &(0x7f0000000600)=0x78) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000640)={r2, @in6={{0xa, 0x4e21, 0x0, @mcast1, 0x7fffffff}}}, 0x84) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000040)='./file0\x00') r3 = gettid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) sendmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000240)="e680e05f5d966373d939c42581047b82e1a2e510c68d8a1ea00d7e50b1e2e965b924158e76e12d51769eae78312f9cd1bdd88c5062021d074e11ea7aad331c51047a7b349aae22bb1be44294990d375b4230076422da48155c801665e01d151349a8105597f097f12ed77833864aaeb5c4892bdb268ad1eecc68b7da1f074545f9892414e10212cd8de382b63816f5b662e6c3ffda59566afa423dc9b61110fde95458d41b45c82a7be87eefc2fceecb44128eaab4d18080af2f9c51", 0xbc}, {&(0x7f0000000000)="a99e5bf1425a0b8595c36238c85ae2d3bad9d6be47d5796235bdb89286", 0x1d}], 0x2, &(0x7f0000000500)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}], 0x20, 0x4}, 0x10) prctl$setname(0xf, &(0x7f0000000700)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828") 22:39:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x5, 0x0, "1ab7670197978f0300000000000004bf764095d43a5094f4b23c1c29b51dda91c51e08a14591eacd58d1107eb341398d6cef4fcdd1579b31460082f27dabdcdbeae764959e0ab30bc8257200"}, 0xd8) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) 22:39:06 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) recvmsg(r0, &(0x7f0000000a40)={&(0x7f00000003c0)=@ipx, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000440)=""/4, 0x4}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000600)=""/232, 0xe8}, {&(0x7f0000000500)=""/123, 0x7b}, {&(0x7f0000000700)=""/199, 0xc7}, {&(0x7f0000000800)=""/87, 0x57}, {&(0x7f0000000880)=""/58, 0x3a}, {&(0x7f00000008c0)=""/248, 0xf8}], 0x8, 0x0, 0x0, 0x7}, 0x2) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x280000, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000200)={{0xf003, 0x1, 0x8, 0x80, 0x5, 0x40, 0x0, 0x4, 0xfffffffffffffffc, 0x1d5e, 0x7fff, 0x2}, {0x3000, 0x100000, 0x0, 0xc947, 0x4, 0x1, 0x1, 0x6, 0x1ff, 0x7, 0x7, 0x6}, {0x2000, 0x100000, 0xe, 0x100000001, 0x100000000, 0x3, 0xffffffffffffe5d3, 0x1ff, 0x2, 0x3, 0x100000000, 0xfffffffffffffff7}, {0x100000, 0x1000, 0x0, 0x680, 0x2, 0x32, 0x7fffffff, 0x2, 0x39a, 0xfffffffffffffffc, 0x10001, 0x2}, {0x113000, 0x4000, 0x0, 0x8, 0x6, 0x200, 0xfffffffffffffb94, 0xfffffffffffffff7, 0x0, 0xe314, 0x8, 0x5}, {0x5000, 0xf000, 0x9, 0x1, 0x8, 0x9, 0x7ff, 0x5, 0x7, 0x8, 0x4, 0x8000}, {0x0, 0x2, 0xd, 0x0, 0x800, 0x9e1d, 0x7, 0x6d, 0x33, 0x4, 0x0, 0x1}, {0x4000, 0x100000, 0xf, 0x0, 0x3, 0x2000000020, 0x2, 0x0, 0x4166, 0x2, 0x80, 0x9}, {0x4000, 0xf000}, {0x6000}, 0x4, 0x0, 0x10d001, 0x4012, 0x8, 0x1901, 0x0, [0x71, 0xd3ae, 0x5, 0xffffffff]}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) vmsplice(r0, &(0x7f0000000b00)=[{&(0x7f0000000a80)="049629f770fdc994cda237354dbcc93e0d060a5e31eda8b205f0d97c82296cfbe98c04339c58d0aa00f9fd2a763e4b7cda59e6ac04746ddd1b904cba96f3f68786e70dbdc939e721a6be42f4793e2079efb5e7b3f0fab919fe2110ba7205b020402b72281114f415", 0x68}], 0x1, 0x1) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0x4, 0x4) 22:39:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="b4000000000000009c000000000003000000000000000000010200000000009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x450, &(0x7f000000cf3d)=""/195}, 0x48) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)=0x2) 22:39:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x200000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:07 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x80000001, 0x200100) accept4$vsock_stream(r2, &(0x7f0000000240)={0x28, 0x0, 0x2711, @reserved}, 0x10, 0x80800) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:07 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f0000000040)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) unlink(&(0x7f0000000100)='./file0\x00') 22:39:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000299f3e)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8f70000000000008000f0fffeffff090000dc2abbeabdcb950900010000040900fcff0000040e05a5", 0x58}], 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x362, 0x200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000040)={0x1, 0x5, 0x7, 0x40}) 22:39:07 executing program 2: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x2, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="e7a6680eb5b69c1f187fab377e5993002ba3103f3ceaafa93a6714a0d9baf848c6e584f18fc0a02e7375a7ffdbb4c3fed52c1ed215d16cdee7ebbdb557a80cfeae1d167c53a522961081ab7aba064ec0b03a641830cf3b64e492b9367329fb6f6468c0ca4785c5814ecdde1aff73ecfc9b60b6fc9628d5818c61a8369ea3f30d2942121a4f4fef022c43d34dcde899983557110b0a70880c1e56e8b390efa8baec3fec726c18f12671491e85b975b3d4dcb3eea4df", 0xb5}], 0x200000, &(0x7f00000003c0)=ANY=[@ANYBLOB="6e6fb38a000000000000ba616c2c0000000000"]) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000200)=0x68) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x1, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x200000004) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$P9_RATTACH(r2, &(0x7f0000000140)={0x14}, 0x14) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r3, 0x0) readv(r3, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000040)={[{0x101, 0x2, 0x8, 0x1, 0x9, 0x1, 0x8001, 0x309, 0x7, 0x0, 0x8, 0x200, 0x5fe8}, {0x8, 0x1f, 0x9, 0x80000000, 0x2, 0x5, 0x800, 0x3, 0x6, 0xc1e, 0x2fe, 0x7f, 0x3}, {0x3, 0x400, 0x1, 0xff, 0x0, 0x8, 0x7f1, 0x6, 0x6, 0x0, 0x7, 0x5, 0x2}], 0x4503}) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, &(0x7f00000001c0), 0x1f, 0x3) 22:39:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = shmget(0x2, 0x4000, 0x54000400, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_LOCK(r1, 0xb) r2 = dup2(r0, r0) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18, 0x0, 0x1, {0x7}}, 0x18) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:07 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_dccp_buf(r1, 0x21, 0x8e, &(0x7f0000000200)=""/204, &(0x7f0000000040)=0xcc) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:07 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="2d42d57aa0cd254e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61db2ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) lseek(r0, 0x0, 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') getsockname(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000140)=0x80) 22:39:07 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x300, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) pipe(&(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000600)=""/130, &(0x7f00000004c0)=0x82) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0xc0400, 0x80) getsockopt$llc_int(r2, 0x10c, 0x9, &(0x7f00000006c0), &(0x7f0000000700)=0x4) r3 = accept$alg(r0, 0x0, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) socket$alg(0x26, 0x5, 0x0) 22:39:07 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) exit(0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:07 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000000000000b9020061aa4fc00084811f4ce10000001e000000000000000010ecec01e5fb00526549734572334673", 0x3d, 0x7}], 0x0, &(0x7f0000013900)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bind(r0, &(0x7f00000002c0)=@generic={0xe, "b3161e0645fef7ea85900b54838818ede2741b7d325d10ef052a40642c654637e27de86d7432c7b68d2c5725b736a2049663e93a324c125dea7a0622050dfd59e521a200433f725dee2c1b4d46228f2e199fcd6a6b136a3737de137ad7a4743620e5c190108d4aea41973671de5967b42ac156279bf98b6614e5b44516f3"}, 0x80) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x4, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x3) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000140)={0xf, 0x5, {0x0, 0x8, 0x9, {0x4, 0x7fff}, {0x81, 0x6}, @const={0x7fff, {0x3f, 0x7, 0x7947, 0x3ff}}}, {0x0, 0x800000000000006, 0x2d, {0x9, 0xfffffffffffffffc}, {0x3, 0x9}, @period={0x59, 0x2, 0x9, 0x80000001, 0x800, {0x6, 0xfffffffffffffffe, 0x7, 0x6}, 0x6, &(0x7f00000000c0)=[0x0, 0x93, 0x8, 0x69, 0x3, 0x2]}}}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000280)=0x401, 0xffffffffffffff8a) [ 1680.662304] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1680.700932] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:39:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:07 executing program 5: syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001a00)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000240)=ANY=[]) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) io_destroy(0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x400) fchmodat(r1, &(0x7f0000000180)='./file0\x00', 0x100) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/13) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue0\x00'}) 22:39:07 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000040)=0x6900b1e4, 0x4) io_setup(0x4, &(0x7f0000000140)=0x0) accept(r0, 0x0, &(0x7f0000000000)) io_submit(r1, 0x2, &(0x7f0000001780)=[&(0x7f0000001180)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000180)}, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f00000011c0), 0x0, 0x0, 0x0, 0x36c97bf2a4fedba}]) [ 1680.891057] FAT-fs (loop5): bogus number of reserved sectors [ 1680.897000] FAT-fs (loop5): Can't find a valid FAT filesystem 22:39:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000200)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:07 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x10, 0x6}, @IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}]}, 0x38}}, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x340, 0x0) accept$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) 22:39:07 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000009ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000240), &(0x7f0000000340), 0xfffffffffffffefd) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="11634840"], 0x0, 0x0, &(0x7f00004ee64e)}) r2 = dup3(r1, r0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x44, 0x0, &(0x7f0000000880)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000100)}}], 0x4, 0x0, &(0x7f00000000c0)="0a419d7a"}) 22:39:07 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='teql0\x00', 0x8}) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f0000000180)=0x1e) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000001c0)={'HL\x00'}, &(0x7f0000000200)=0x1e) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={0x0, 0x6}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000002c0)={r2, 0x7fff}, 0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000380)=""/3) sendmmsg$nfc_llcp(r1, &(0x7f0000000c40)=[{&(0x7f00000003c0)={0x27, 0x0, 0x1, 0x5, 0x8, 0x4, "1b0cd0311b3d0105fb81762b8d931e6bfcfe45c93f564c2b544a78a04e108dd03ae4d6dfc406f1fb57f082cc54cd27838b2ad44f76f532761747c4391e4ee2", 0x23}, 0x60, &(0x7f0000000ac0)=[{&(0x7f0000000440)="9fa36c08498d6cb42ac35ff7ef1bdf253f60ec99d35617f43d0adb2c8779054d11dc2dbd880169b89a6ddfa5fab4445623fed185f287", 0x36}, {&(0x7f0000000480)="6ce4664b05eac561cfd1d7e9af6c7821429bb6e09fa6202fadd19a5860c7b3551f4d5b05679077e2313179f6d0fcf0cee4846f4af96141db36e37a6120489e2ebefa7193d5969450853435c39fac99fbf7752db81bf0364bfdf2f6544bcb7176cced2741df99550b0352cacb7f9b76cbab1a1564a01652c0d7564caa19d48df83d3567e69b127801c8eb7d7336d31b43acf19b959a573cf32c264d586caf8795216ede7994ca73b984da864afcc05596b97a2c4ae1d9d593cb13bd913945efd74ad36330c0c880e38292df0448c97e744705b9", 0xd3}, {&(0x7f0000000580)="41ea65121c0e440ad048d661e6ca5901eb68c57b0466e7ca237a96eaffb9cdd4dac0a038ec9a09b6341560069f342012e8a1b1f5d24a319baed786864b548b6bb26554ecd50897c88014844824951b5dde228141ec4e867611c7f47a3ac4d821604980f5a9f151e4a0196eeb8c90584a3df794f8ea568157c51830b0ec56bdfd44230b1be94eded88826d9ce0459fa028d57326cf31c004f0f64309b5b2690af0d54e8fcc6b34a7b317a1d23cb563b0bc983a59272f0bfb86ef96b79006d11641fb197f5ddb6645ad1b6f122a35aa716ea131d44b0e97dae860a403258e5393042f977", 0xe3}, {&(0x7f0000000680)="ed4c39f93f18ef549d5d239b13bac311b0b8f11dd4c0ff424a375deef497e5f010944aa58599801836d4fce546e5e689479cd8293b45d4a7af09b04d16bc10f4a4b5f757f3b47ac1de7dd4c6d51891bbb8efd6ddb7a08bdaefab16455eb8f9ba0b697f7ed3df4059320af684e805f859dd522535353e47a81c85373d0461e12e8621dd8d0504fe55674c5127ae5a5c236779524d58b3dbcb328b0d8f931b92c9704908fe", 0xa4}, {&(0x7f0000000740)="1517385ba7c3a5f3ddf2d2fd4a51aa697585e4f9a022bd0403074c7cc70264837ef6618d2027f0861976bc84476cff5ea292164f9d4ca4ba890cd31108569db765eb9442a8f96f36cb2aa05511f4ccad67505c75974d35110f3b0434481ffdd62d599ac5d3864dfcca03706ce8afc4eb3204b83d74765ceb1010bcc98c7f1512f66729e5", 0x84}, {&(0x7f0000000800)="f0bc826263476765e9318b1caed12b39d8720c34e2b44b60be5cb3b22144d424079b97963ea1754cedad2fa60bbf57a959a02b4e4df234c6b50174ee0aaf739628e04bd8be5432fdf21be5fa17164ce0e9fb22079ee8236d0b962412021d70a0037f66481550455724f004b8233b2612c8e747f62c1dad67ae5e5310eb4473ae4089edddfa0cf8e0841fcf69a3a30d0d1892c8e58a9b7d5ed5f38d0aa142d7c3a3fff1518ec28e8ef6debd43ce82ee69a7e52f0bc7a02460daebeb33eb608d95e09ca5df8d2bd620874da4bca89287cb048a1f190879", 0xd6}, {&(0x7f0000000900)="ce9bb1c04a5e03ee7fa2042c3b5344ad50983254ea49d2286e4ac27d4dec9e62cde8b68940c306f81bee5e01d0753785ea8f1364788e05", 0x37}, {&(0x7f0000000940)="e59938c7be181d560cd5e5c3c5bb3f561d23f5b2903a56a0f1b599ec5186cd9b3f3f84e3779ab465dd01cc042f5b6b641db2db063e0f0987b444be26689d672e0dd15b6c08fab79773341cce14fb92c6d0846aa376115eb3e03ed41cb26a865d14730bfd0da8390c9eb1e336f8", 0x6d}, {&(0x7f00000009c0)="2a59a2ffe603fb6508393942bb018ad2673a43f946798acbc0c57802749927f61310eca638afd0b39d1d9ba98fd880dc25852d77736b509493f534258f20a99cc30308978419ee7c14b5b61dbff8ef20b07266152995296fa49c65dc1850552dbfe17df21753ca88a0432096baeb81c0f383a950a90255a830cf8f93e20a70c2ae88c07f0295589dc16f7acdd8dd10abb2a5fa3112d8ccd53d507ba7a7208774313810398ed8b3e5cbbd5c315b5b12f1506558272afbb0372dce4b4f5ec0d8d4c96543b0f1cb275fa097e2b90978a5b757742e6ea593be251b7d1b6ea4703e8d24b07035a2d46ee3e9238fe3edfa4dd305d205671eefd7d0bb6792", 0xfb}], 0x9, &(0x7f0000000b80)={0xc0, 0x10d, 0x2, "735a96e63b45bca28da15b9c56a7f0f21acab0667c2844f22e98b2b3b213014e79777de7a5bf9018c07910f135178b8e5b1ddc4ac12f9dc60079835b8bce42c7b9c3748498ad5860b53372830afa35b432819cdb67c5a26233a730aa9e4f61222176ae8e7406087f265d6dc088c7078d94b2a07b2e4dc1d892af24c0e4d5381337914c87ee125d16d07417a7de93872026f53288ada3662d6573f0485784875de9f85322e10c233a2eec8cff"}, 0xc0, 0x404c001}], 0x1, 0x4) ioctl$TIOCNOTTY(r1, 0x5422) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000c80)=0x5) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000cc0)=""/112) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/vsock\x00', 0x4000, 0x0) recvmsg(r1, &(0x7f0000000fc0)={&(0x7f0000000d80)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000e00)=""/200, 0xc8}], 0x1, &(0x7f0000000f40)=""/88, 0x58, 0x6}, 0x10000) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000001000)={r4, 0x1, 0x6, @dev={[], 0x15}}, 0x10) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000001040)) sendmsg$xdp(r3, &(0x7f0000001600)={&(0x7f0000001080)={0x2c, 0x1, r4, 0x3b}, 0x10, &(0x7f0000001580)=[{&(0x7f00000010c0)="3fe176a0ba029fbad0bc88964c4f3187d797cf96cb4f70f2cf12357be35062b15ecb260ae038b0978ad614aa81a4ec050e6aed9896daaced367307767aa1a71c707dac2e00b65e484fbd16d7dd9a586ed4aaed", 0x53}, {&(0x7f0000001140)="a463cb2542bc13a27ec06d371bb07518a10ea309e83fcb625e1d862363ae6dae1d86599df088be25748f5cac6e7c43696d7df6b1c4a1133892111f3d153da53b96d017d8d15ff3053f", 0x49}, {&(0x7f00000011c0)="96cfde0ce526f42cf064c224f9008dbb2366a0e788d7b0b256f930d689b5841d9ce484f7780fa7a0bd824def64adba9b89094a50f3b2a89073460cc05e40897488d6f5126a5a51a6c85655a111c191b6507aa6bdd741ed273fcf8018dfbfeb1dba7731bab154782c1a3280ffb088f2e75912e6ddbea9d97075374fe8af3c25a4a9cb4281433fa906d80a57f21e71f2be4db47316fcfb0361fe06ff599caf3c9fb8c17eefe60f5229d4dc33988f3b1bb80ea69537bc5bd43a9211edb49edd14dcca5f7830230267d750bdf0157458b132f14215e52a4b22ab7e71aee12d95064d30c2b30f8fcf9435e811f6903d4bd1fd1c34", 0xf2}, {&(0x7f00000012c0)="d0fe1f1d71df1263ebcb4136df21ea76b972271d9ec7e4bc0ad5b3209a7563652c0b1b27b59e0728515f737e037aeb284472cf04d538065411b7a1111dec379daae52028213a01f47fc3f74d2fdf9bddcb615baa60d36942588e28d09214ba86aef98945ee1f77771f2232535b06f0a5a1b45b96dd6fb21415882a9791786168ae6c473d", 0x84}, {&(0x7f0000001380)="3bd2a759c296d982db9dd517ef5132e637cf994efb97560b45d1ab8a666979c012a0de1c6af8369be62145fe1f55c6a8414e062c4603603dcffefa2f40611af19ec23ca38e5b9984464f3a5c16a4f71aa83a03cf65eb7499f6448093f436ea8539d366d7090ffe184df61ddae2ac81931c2f851a9a14b81e5a49ea3cbccaa9ef887132e568427bc962363a2f466fdb88b6f0fd443916e0cd7d331a1c3e4d5f5bda863bca43eb3b4aea7c063bae2510f4696a876fe696e2b2e79945cbcc6cf45df62bc8a0144d7f9930a00a28dbd1edc34e3a8790e234626d", 0xd8}, {&(0x7f0000001480)="749b78347bbfc76e816281bfa071219faca32679aab1437078addd55b9fced797c5166b18f0e463bc99aa6c67c1570da78550d05c06ac89f8062f54ca023d2ce507ea762973fa6950f23c3836e4b1daf2bfc312fbfcf62236270d3bb73dd58bd6332265f2447c1210ef14a017b91f78152725c5a939af04e4b2f8be76d7f6205f913cc8cdc4602577629730eb7b71b39842a9acd4141785745589556c4712e4af1203ce1b380ecb8dfc2ba53d6360e41593d6691a6dc8817ac4d9d76e810011f920f69d881c93c54ce1220037559fda13681f38e0b4f", 0xd6}], 0x6, 0x0, 0x0, 0x8000}, 0x20004840) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000001640)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001700)=@nat={'nat\x00', 0x1b, 0x5, 0x478, 0x100, 0x1d0, 0x0, 0x2c8, 0x100, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x5, &(0x7f0000001680), {[{{@ip={@multicast1, @multicast2, 0xff000000, 0xffffffff, 'nr0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x2f, 0x1, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x801, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x1, @empty, @dev={0xac, 0x14, 0x14, 0x14}, @icmp_id=0x68, @gre_key}}}}, {{@ip={@loopback, @loopback, 0x0, 0xff000000, 'syzkaller1\x00', 'eql\x00', {}, {0xff}, 0x84, 0x2}, 0x0, 0x98, 0xd0}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x5, @loopback, @empty, @gre_key=0xffffffff7fffffff, @icmp_id=0x68}}}}, {{@ip={@remote, @loopback, 0xff000000, 0xffffff00, 'lo\x00', 'nr0\x00', {0xff}, {}, 0x0, 0x1, 0x55}, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x7, 0x6, 0x4}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x4, @local, @rand_addr=0x4, @icmp_id=0x66, @port=0x4e21}}}}, {{@ip={@multicast1, @multicast1, 0xffffff00, 0x0, 'gre0\x00', 'veth1\x00', {0xff}, {}, 0xc, 0x3, 0x1}, 0x0, 0xe0, 0x118, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@icmp={0x28, 'icmp\x00', 0x0, {0xe, 0x1, 0x8}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @loopback, @rand_addr, @port=0x4e22, @icmp_id=0x66}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4d8) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x2000000, 0x8810, r3, 0x0) socketpair(0x1f, 0x2, 0x6, &(0x7f0000001c00)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000001c40)={r4, 0x1, 0x6, @local}, 0x10) sysfs$2(0x2, 0x7d55, &(0x7f0000001c80)=""/191) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000001d40)={0x100, 0x3, 0x7f, 0x7, 0xfa, 0x4, 0x5, 0x7, 0x2059}) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000001d80)={r2, 0x4a8, 0x8000}, 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000001dc0)={{0x5, 0x613}, 'port0\x00', 0x44, 0x2, 0x100, 0x8e, 0x8001, 0x0, 0x7, 0x0, 0x5, 0x3}) mprotect(&(0x7f0000fc0000/0x1000)=nil, 0x1000, 0x1000001) name_to_handle_at(r1, &(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)={0xf2, 0xffffffff80000000, "1a6a19c702af9f07045f76ee5c11f2c0db0444ceb337e4c12b999f07724639ad469fac2777aa5c05b9234fe1c94ba2135aed746b05911d14b3b8a306780b7a2adf334144d166a9c284a189d94619decd81fcbf19cd5cb3bf8e57e70255680614688a2a73bed98b762c282b45d8b66f733e71a523c0166c0aa220a52e14212b462701890a3bf8baaa8c5ed3955142b246a7a4bd9226ed2a625ab0d480690d3ce4864e02e210188087326a00f00f49e42f157fb79f51f3e5867e1ee04c66d2889a3a9026f1d84516ed50f58a377f271cfbb143ef54e0f03433dfc0a00aace2382c2a388cba4baea0950aca"}, &(0x7f0000001fc0), 0x1000) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000002000)={0x3d, 0x8, 0x8a, "94a72e17a3b03220ced514d880abc0815a3e45418e4796d8e07449e4fb0b34b1ecfb6a3b58a2274a1a7d90ca34147ec7bb0e2b2e2d6b9a7062b9df8104"}) 22:39:08 executing program 1: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0)='p', 0x1, 0xfffffffffffffffd) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xfff, 0x200000) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0x4) keyctl$set_timeout(0xf, r0, 0x0) 22:39:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) creat(&(0x7f0000000100)='./file0\x00', 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) bind(r1, &(0x7f0000000000)=@ipx={0x4, 0x7, 0xfffffffffffffffd, "4c904567f423", 0x9}, 0x80) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000200)=""/123, 0x7b}, 0x0) [ 1681.070289] netlink: 'syz-executor1': attribute type 16 has an invalid length. [ 1681.093355] netlink: 'syz-executor1': attribute type 16 has an invalid length. [ 1681.143163] binder: 20246:20248 transaction failed 29189/-22, size 0-0 line 2852 [ 1681.152468] binder: undelivered TRANSACTION_ERROR: 29189 [ 1681.160340] binder: 20246:20248 got transaction to context manager from process owning it [ 1681.168856] binder: 20246:20248 transaction failed 29201/-22, size 0-0 line 2843 [ 1681.181694] binder: BINDER_SET_CONTEXT_MGR already set [ 1681.187584] binder: 20246:20251 ioctl 40046207 0 returned -16 22:39:08 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2100, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x20, 0x4) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0xffffffffffffffff, 0xdb, 0x80000001, @buffer={0x0, 0x9, &(0x7f0000000100)=""/9}, &(0x7f0000000140)="052a91b026c7855284cb95111671fb8dd8182a10c09c2a24707705d8511f32c875404a168eae85c04ee2518fe35a78915c88445e278fc777c647a9588345307dd1f7977fb97f7861969483801b2831064568c734c6bbb6ad2311e51e682ca3ae2ae485c75caca2a7c46abe7831e87f9865c2b37cda324cb6d4f5ea07ed610186908f52507e68bff2a4542236a50be24785beedfb86332f3d5a9e15e46d69db2e244d3daf979b97d43c1775e384e349234f97f397faef7418d6b1a004f8a7b1bd7f6385ff50b9ad25e0d8ffecfb0810f19f0afddeed3b243450e767", &(0x7f0000000240)=""/69, 0x7, 0x10022, 0xffffffffffffffff, &(0x7f00000002c0)}) write$input_event(r0, &(0x7f00000000c0)={{}, 0x12, 0x8001}, 0x18) 22:39:08 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='u\x00']) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0xa}], 0x20, &(0x7f0000000340)=ANY=[]) fchmod(r0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000)={0x3a3f}, 0x4) fchdir(r1) ftruncate(r1, 0x9) open$dir(&(0x7f0000000240)='./file0\x00', 0x80440, 0x0) truncate(&(0x7f0000001740)='./file1\x00', 0x0) [ 1681.194403] binder: 20246:20248 transaction failed 29189/-22, size 0-0 line 2852 [ 1681.202726] binder: undelivered TRANSACTION_ERROR: 29201 [ 1681.212577] binder: undelivered TRANSACTION_ERROR: 29189 22:39:08 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x7, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x20000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f0000000040)="c4c27d1a28f04083248bccc4e3791d170066430f3a41e000b9a10a0000b8ed000000ba000000000f30c462d1bafe440f3566baf80cb88c91668aef66bafc0cec66b8d8008ec80f0118", 0x49}], 0x1, 0xfee64b5def490aec, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r0, r2) dup2(r2, r1) 22:39:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f00000002c0)=0x2000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) wait4(r2, &(0x7f0000000040), 0x1000000, &(0x7f0000000200)) 22:39:08 executing program 4: open$dir(&(0x7f00000000c0)='./file0\x00', 0x101842, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) unlink(&(0x7f0000000240)='./file0\x00') write(r0, &(0x7f0000000600)="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", 0xe00) fcntl$getown(r0, 0x9) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}) 22:39:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:08 executing program 5: r0 = socket(0x50000000010, 0x2, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0x80822, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r0, r1, &(0x7f0000000140), 0x80000002) 22:39:08 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040)={0x6, 0x0, 0x2, 0x9, 0x800000000, 0x9, 0x7f, 0x4, 0x9, 0x44, 0x100}, 0xb) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f0000000200), 0x4) 22:39:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x16, &(0x7f0000000040)=""/23, &(0x7f0000000200)=0x17) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:08 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) prlimit64(r0, 0x0, &(0x7f0000000140)={0x800, 0x2}, &(0x7f0000000180)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x1}], 0x1335) 22:39:08 executing program 1: r0 = socket$inet(0x2, 0x80002, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'gre0\x00', r1}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x10, &(0x7f0000000040)={@multicast2, @local}, 0xc) 22:39:08 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000003c0)="240000005a001f00ff03f4f9002304000a04f51108004000020100020800038001000000", 0x24) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'bcsh0\x00', {0x2, 0x4e24}}) 22:39:08 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ab4f3fec94248c32e27d04000000288a", 0xfffffffffffffd9c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x20000, 0x0) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x8, 0x2) 22:39:09 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = epoll_create1(0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46080300ed459d000000000000000007002000000026010000000000004000000000000000630000000000000009000000ff7f38000100f9ff00010200010000000001000080ffffffffffffff0000000000000000040007000000000000000000000000000600000000000000010000000000000000000000000000000001000000000000ff7f0000000000000800000000000000000000000000000081000000000000007f00000000000000ef5b1c3b7df41666cd34850b"], 0xbc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000100)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000001140)='./file0\x00', &(0x7f0000001180)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB="e0504c806e6f3d4363aee984fb831dfdee3e62a2f88f0f806f7a9bedebc2e1da0b597ba608dc8192118fa5ecb5c72a439eecbe800124dca1e8709029d07b8edf82bd42e8b38ba22fdd6795c84058aea39997930da406c0ac4ded4b5ffc7258020294cb6d9cf6267a5c1262607d3c7327473590f8c75c089ee6241f8e3059732b3476f74a7beecf11a1f80b6bcce96224b7e089999641bf86a8e0230424c1ee35e67d6bb09660c44dcfe9eca4977bf863250cd6c33fa11b6fd0ca3487c62f8a178cce5eef7b629ccdbdcc", @ANYRESHEX=r0, @ANYBLOB=',\x00']) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x7}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000001c0)={r3, 0x20}, 0x8) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000000000)='.', &(0x7f0000fdb000)='hpfs\x00', 0x1002, 0x0) 22:39:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000240)={0x0, 0x6}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)={r2, 0x8}, &(0x7f0000000300)=0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x8000) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0x6, 0x3, 0x1}) r4 = accept$alg(r0, 0x0, 0x0) recvmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:09 executing program 4: r0 = socket$inet6(0xa, 0x1000000000003, 0x7) prctl$setendian(0x14, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") fadvise64(r0, 0x0, 0x4, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000340)=0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000400)={r1, 0x41, &(0x7f0000000380)=[@in6={0xa, 0x4e24, 0x100000001, @mcast2}, @in6={0xa, 0x4e20, 0x2e, @mcast2, 0x3}, @in={0x2, 0x4e24, @rand_addr=0x8af}]}, &(0x7f0000000440)=0x10) unshare(0x8000400) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_int(r2, 0x28, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0xffffffffffffff67) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_xfrm(r3, &(0x7f00000002c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x11000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=@getspdinfo={0x140, 0x25, 0x609, 0x70bd26, 0x25dfdbfc, 0x9, [@replay_val={0x10, 0xa, {0x70bd26, 0x70bd27, 0x2}}, @migrate={0x88, 0x11, [{@in=@multicast2, @in6=@ipv4={[], [], @remote}, 0x3b, 0x2, 0x0, 0x3506, 0x0, 0xa}, {@in6=@dev={0xfe, 0x80, [], 0x15}, @in=@multicast1, 0x2b, 0x3, 0x0, 0x3501, 0xa, 0xa}, {@in=@rand_addr=0x3ff, @in=@multicast2, 0x7f, 0x3}]}, @sec_ctx={0x88, 0x8, {0x82, 0x8, 0x1, 0x0, 0x7a, "746405b4f0fb3f6cf40c10e38674d5b85952015bcafca3df5ce1be51a54ea14dd8c16a82ee8fab9d507a2170bc649b2196a7fb996136ffdd66998b580dff938657f26bf00b76bcb4aa54ac788e1606548f924dd5bad1c605d9873e598a4cdb8d66e53e708c7487555ad4cf794a75e91a69c062864a21ef606a4b"}}, @lastused={0xc, 0xf, 0x439aa181}]}, 0x140}, 0x1, 0x0, 0x0, 0x8000}, 0x0) [ 1682.302323] 9pnet: Insufficient options for proto=fd [ 1682.311265] 9pnet: Insufficient options for proto=fd 22:39:09 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x100000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:09 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = memfd_create(&(0x7f0000000000)='skcipher\x00', 0x2) setsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000200)="53b54fffd1d72248b8af24fa600c00f2647af3ac29fd5896365dd1dcad3010cd066a83090b0d26f56542bc229b936d8ee1b089a522ea5497f76c70c3953dc4bd37003e0bd9a4dc810f66a4468130f37c3c45047131798e6360c866fbd8f33c106c0f29ad22dc7ce25abe84efef82da52fb738b961d61a8b696b04fe43df8a4f234a1e79e0b8ffdefcdd5ae71621f57c6059824b27efe3a06582171fc858163e4d6b8488b9a76be4b6dff67b3", 0xac) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x40, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000040)=0x7a) ioctl(r0, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") r2 = socket$inet(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x83, &(0x7f0000001200)={'nat\x00', 0x0, 0x3, 0x2d3, [], 0x5, &(0x7f00000001c0), &(0x7f0000000200)=""/4096}, &(0x7f0000001280)=0x108) 22:39:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x40c100, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000280)=@int=0x3, 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) listen(r0, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f0000000040)={0x6, 0x6, 0xc1, 0x2, '\x00', 0x1}) fchmod(r2, 0x49) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0xffffffffffffff6d}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x200000000000) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f00000002c0)=0x8, 0x4) [ 1682.558778] kernel msg: ebtables bug: please report to author: Nentries wrong [ 1682.578586] kernel msg: ebtables bug: please report to author: Nentries wrong 22:39:09 executing program 5: clock_gettime(0x0, &(0x7f0000000300)) clock_nanosleep(0x9, 0x0, &(0x7f00000001c0), &(0x7f0000000380)) r0 = socket$inet6(0xa, 0x8000f, 0x0) r1 = gettid() r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)=0x0) getgroups(0x5, &(0x7f0000000180)=[0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={r1, r3, r4}, 0xc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) clock_nanosleep(0x6, 0x1, &(0x7f0000000440)={r5, r6+30000000}, &(0x7f0000000480)) r7 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x82) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f00000003c0)={'\x00', 0x400}) r8 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) sendfile(r7, r7, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r7, 0x4c01) ioctl$LOOP_SET_FD(r7, 0x1261, 0xffffffffffffffff) 22:39:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r4, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x400, 0x0) [ 1682.782018] QAT: Invalid ioctl [ 1682.790764] QAT: Invalid ioctl [ 1682.872643] QAT: Invalid ioctl [ 1682.876842] QAT: Invalid ioctl 22:39:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:09 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='%\x00', 0xffffffffffffff9c}, 0x10) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000240)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x2}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r2, 0xc0405519, &(0x7f0000000000)={0x6, 0x7, 0xefbf, 0x2, '\x00', 0x8}) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x1ff, 0x1, 0x4, 0x800, 0x2}, 0x14) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) membarrier(0xf4639c794a28670a, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) 22:39:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000002000)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f00000000c0)=r3) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000680)={0x5c, 0x0, &(0x7f0000000500)=[@clear_death, @reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), &(0x7f00000003c0)}}}], 0x0, 0x0, &(0x7f0000000640)}) 22:39:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r4, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x400, 0x0) 22:39:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000440)={0x5, 0x10, 0xfa00, {&(0x7f0000000580)}}, 0x18) 22:39:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x25}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0xfffffffffffffffc, 0x0, [], 0x0, 0x1226a8c66eba346d}, 0xfffffffffffffeca) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x5d, &(0x7f0000000100)="79e313e31150f3ff3ed3be97d835", &(0x7f0000000140)=""/93}, 0x28) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000480)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xb, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffff}, [@call={0x85, 0x0, 0x0, 0x27}, @map={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f00000002c0)='GPL\x00', 0x3, 0x2f, &(0x7f0000000340)=""/47, 0x41f00, 0x1, [], r2, 0xa}, 0x1b7bb1e5565e9f7b) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000240)) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[], 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000300)={0x28}, 0x28) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000280), 0x4) 22:39:10 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @multicast1}}, [0xfffffffffffffffc, 0xffffffffffffff8f, 0x7, 0x10000, 0x200, 0x8, 0x7ff, 0x80000000, 0x2, 0x4a2, 0x3, 0x218116a, 0x7, 0x15a, 0x5]}, &(0x7f0000000340)=0x100) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)={r3, 0xe, "064c6e4bc0e69c97a305ad26b0fa"}, &(0x7f00000003c0)=0x16) getpeername$inet(r2, &(0x7f0000000040), &(0x7f0000000200)=0x10) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) [ 1683.061123] binder: 20391:20401 BC_CLEAR_DEATH_NOTIFICATION death notification not active [ 1683.069767] binder: 20391:20401 got reply transaction with no transaction stack [ 1683.077399] binder: 20391:20401 transaction failed 29201/-71, size 0-0 line 2759 [ 1683.094559] binder: BINDER_SET_CONTEXT_MGR already set [ 1683.100856] binder: 20391:20405 ioctl 40046207 0 returned -16 22:39:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r4, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x400, 0x0) [ 1683.108551] binder: 20391:20405 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 1683.115747] binder: 20391:20405 got reply transaction with no transaction stack [ 1683.123355] binder: 20391:20405 transaction failed 29201/-71, size 0-0 line 2759 [ 1683.131556] binder: undelivered TRANSACTION_ERROR: 29201 [ 1683.144528] binder: undelivered TRANSACTION_ERROR: 29201 22:39:10 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:10 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r1, 0x7, 0x1, 0x401, &(0x7f0000000240)=[0x0], 0x4000000000000179}, 0x20) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x7, 0x8, 0x3, 0x8000, 0x56}, &(0x7f0000000280)=0x14) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r2, 0x96, 0x59}, 0x8) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) recvmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:10 executing program 1: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e21, @multicast1}, 0x10) sched_rr_get_interval(0x0, &(0x7f0000000080)) connect$inet(r0, &(0x7f0000000580)={0x2, 0x4e23}, 0x10) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x6, 0x3, &(0x7f0000000480)={{{@in, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@dev}}, 0xe8) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0xfffffdad) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x1, 0x200800) ioctl$UI_DEV_DESTROY(r1, 0x5502) 22:39:10 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) getpeername(r0, &(0x7f0000000d00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000d80)=0x80) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0xa, &(0x7f0000000980)=[{&(0x7f0000000200)="b38420e4d87842a9a25ea2d2f08f05c81463657d335b4f099266820949919ab1aca1bf07020c72ae8d372ebe39b8b03ad864ab35e42943bb866033929582144ce6167416615f58242ac2c25480a7a696af65b041c395027446168ff654b80b3b03e73b2777b27fa60eaac4f6424858cf2931e519a71956ab576bc51906611fcff4afaec8dbde411dc2dec58b9cb1eb9f2934caf8a24b9f4b360ab82eafc1cb14d54d865f23c6d1572e07732109af2d3cf0c0ff29511b", 0xb6, 0x80000001}, {&(0x7f00000002c0)="450d847c220ab1d496af8aba7a372deab630e72913792e71dfa5cb916ba3c9d5ebede3141efc26264098f1b67975b985cc9d69ac37b1bbbe90d3b372bc4f5d1dff25f0f3d0d1df4dd0e1955cbf12094c4f096d49356fc91670e79cd6ff8a70fb1f03b8e13813ee967aa7cf98ffa7bcc890d5b805c23104888dd69263ef7749d32f6f86456413e952449876bc3b00d6c9dc48259051a96e5919fc202ccf607445f32abc70c7964e7730784fc9996544eaa82c24d2f55718015fd57d4a1620760ca80fb5ba202906", 0xc7}, {&(0x7f00000003c0)="b9abc70444d1c0702a2b6dd2e51ce5fc2e28f822d6893b4ad21464b85c4eac9c7b84baf1d524c6b73b73f8a260808d67d7a1ba0bc7ee58a15df42cf32d2458b407e3fa8056a9e7be80581f2ac0100f23b1a7e0ca6bbf674226a834fa96a9a9415b97bc6180c41e3c84c27d62e3911e14ffa59ddf573fc122a5087f31bc2b3673788744ac16043e8209d42149a8aa43e487", 0x91}, {&(0x7f0000000500)="b41111aa23ca510194fbd1815d24bb10c1dd23940bf4db40df53facacfdc4303c6a9ce9c2b9383b914ea9af2e1c881d335c261f095a4e4fd2e6aed36808fcd45752921b003bb5ac3fec0f0790d078d21eefbf19e80c3dfd2d3e3f7df9c55cde4d9f8638aafec0dac084fd82747817460ef05534aad54", 0x76, 0x22a}, {&(0x7f0000000600)="45d6d28a8491fca8df397dd5cf8fd13b397c0d6816d8fe73dda2f13390f5f4bc5fed2fedf29eb10b4483a920f98935f9d37248764ad74a99e972bb6802c9740557af9a5f993dec9fd69bbf63937ff39f895fe571477f31a162d7f1", 0x5b, 0x7}, {&(0x7f0000000680)="4a94d490ea04401eaed3dad0183feb74c18f5371eeed3d7d40cc523092264933de6bd0d463247b1271961684abc3efe382f050ee5bbca55ed0bd6f4038d90de803642cfdab55b699d8c76838897bb481685f70de053f0972089a17d1bc52a514", 0x60, 0xff}, {&(0x7f0000000700)="b73d40eed902b43e4092979f91594d6ebb107dc5e9c635dc926c454f5cde798fab87b4545a9015de80f1604250fc2452220896cdc6d873", 0x37, 0x4}, {&(0x7f0000000740)="2a8adaf018073a7bacef452ca380b229", 0x10, 0x9}, {&(0x7f0000000780)="4b4203cfcb84998f28c80c42e7dcdbbc1ac6b2b605314dc81cfb2165f9b6c9093fef19fd793a43d82ebd2aa21d836d479a357682db07327f59d29b04c4b88569092ee95c734929a4cedd3edd5cab0d38f5fd8587f158edf5551d51dce1d8ba9ac828b99cdfa0b5bd77caa3f42077c023fb1751a7a153082be1e486d622f23b01d5ebeee997177d87fa989d173d1b323d345f755dd0666548bd1cbf545b36b71ea7faab21bd00991c9b1578b890b6b4b11b0f3f5c793558da7d6ee52bf01d53bef0648e14c6e9635de9a026551ef0193538d6aba359719d6121903c31745a7a64f8582139e47aac84e3fb64e7bf4404d117a0fb9bd5c9ec3cc8", 0xf9, 0x3bad}, {&(0x7f0000000880)="d610f62f5eda7527383127d0d1876d30fec16a045d6efa9bef39c778318afea0ab1a90e039d5c804713d20fd4a7d9fde1f50c3e898c6b8c150dedc9759a2e00c480c5f992e28390c19da934757a542abf6c48a222717ab802f11eca102f555ebb574e3f79e009aa0fbfcdb62ef949c9b021229770056603c5e5d2340352952c7eb063b90f5cbb77f463ab5722fa15f4ad35bde97ae285c6f8e34a0ec690b80dcd5a7643af632c25cdd032e118736e6e51fe34d540b0a8953f6f85d08e4434258733ae5062d3da2e9f79d8634d76ab4547196b73a52b9a6468426db605a6d12e494a7be9d9b0c7646d5093bc2b3ee740ca2", 0xf1, 0x9}], 0x10000, &(0x7f0000000b40)={[{@type={'type', 0x3d, "b98004fc"}}, {@nobarrier='nobarrier'}, {@uid={'uid', 0x3d, r1}}, {@barrier='barrier'}, {@barrier='barrier'}]}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) pselect6(0x40, &(0x7f0000000b80)={0x6, 0x3f, 0x1ff, 0xfffffffffffffffb, 0x80000001, 0x7fff, 0x7, 0x4b}, &(0x7f0000000bc0)={0x8, 0x1cf, 0x9, 0x3, 0x5, 0x7, 0x1, 0x4f607127}, &(0x7f0000000c00)={0x8b7, 0x800, 0x3, 0x176, 0x571000000000000, 0x3, 0x3f, 0x7}, &(0x7f0000000c40)={0x77359400}, &(0x7f0000000cc0)={&(0x7f0000000c80)={0x1f}, 0x8}) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:10 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup2(r0, r1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="dc58f01e855a0a43b3e6ccfe6dcc91fbe2dfed6a75d11f5582f9d4b5a37fc61c9ed80a640ea6cdcba8d56ddf3b760fd01985c4d4bc00f7bf0d36bd5c90efa0e88a79154e27a60bec8919253ff4da146fc846ea", @ANYRES16=r3, @ANYBLOB="020928bd7000fbdbdf2505000000140002000800030004000000080002004e24000008000500000000001400020008000b0002000000080006003f000000"], 0x44}, 0x1, 0x0, 0x0, 0xc050}, 0x40000) capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) prctl$seccomp(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) [ 1683.543188] hfsplus: unable to find HFS+ superblock 22:39:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r4, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x400, 0x0) 22:39:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0xffffffffffffff65) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x80, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000140)="0a5cc80700315f85714070") r4 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r5 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r5, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000480)=[@flat={0x73622a85, 0x0, 0x0, 0x4}], &(0x7f0000000600)=[0x0]}}}], 0x0, 0x0, &(0x7f00000007c0)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000700)={{{@in6, @in=@multicast1, 0x4e21, 0x7, 0x4e22, 0x4d0a, 0x2, 0x80, 0x0, 0x87, r6, r7}, {0x5, 0x6, 0x3, 0x9, 0x3, 0x58b, 0x7, 0x6}, {0x9, 0x3, 0x2, 0x1}, 0x0, 0x6e6bb3, 0x2, 0x1, 0x1}, {{@in6, 0x4d4}, 0xa, @in=@loopback, 0x3505, 0x3, 0x2, 0x7f, 0x6, 0x800, 0x6}}, 0xe8) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000040)={0x6, 0x101}) 22:39:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x2, 0x0, [0x48]}) 22:39:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r0, &(0x7f0000bc2000)="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", 0x2b1, 0x0, &(0x7f0000606fe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000e8e000)=[{{&(0x7f00008b6000)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x1}, 0x80, &(0x7f0000231ff0)=[{&(0x7f0000f89000)='t', 0x1}], 0x1, &(0x7f0000dffeb8)}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f00006a7ffc), 0x4) listen(r0, 0x7) r1 = accept4(r0, 0x0, &(0x7f0000622ffc), 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="93"], 0x1) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xece, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000100)={0x60, ""/96}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000000), 0x8) 22:39:10 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x100, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r1, 0x28, &(0x7f0000000280)}, 0x10) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x5, 0x80) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x1, 0x4) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000040)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r4, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) [ 1684.081903] binder: 20460:20464 sending u0000000000000000 node 1187, cookie mismatch 0000000000000004 != 0000000000000000 22:39:11 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r2 = dup3(r1, r1, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) r3 = getpgid(0x0) setpriority(0x2, r3, 0xffff) 22:39:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) [ 1684.130152] binder: 20460:20464 transaction failed 29201/-22, size 24-8 line 3046 [ 1684.161482] binder_alloc: 20460: binder_alloc_buf, no vma [ 1684.167208] binder: 20460:20470 transaction failed 29189/-3, size 24-8 line 2967 22:39:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r4, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) [ 1684.178610] binder: BINDER_SET_CONTEXT_MGR already set [ 1684.184552] binder_alloc: 20460: binder_alloc_buf, no vma [ 1684.190278] binder: 20460:20471 transaction failed 29189/-3, size 24-8 line 2967 [ 1684.199734] binder: 20460:20464 ioctl 40046207 0 returned -16 [ 1684.207492] binder: release 20460:20464 transaction 1186 out, still active [ 1684.214722] binder: undelivered TRANSACTION_ERROR: 29201 [ 1684.221120] binder: undelivered TRANSACTION_ERROR: 29189 [ 1684.227105] binder: send failed reply for transaction 1186, target dead 22:39:11 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x7000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000280)={0xff, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}}, {{0x2, 0x4e21}}}, 0x108) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) accept$alg(r0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/69, 0x45}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x40000002) 22:39:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r4, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:11 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) accept$alg(r0, 0x0, 0x0) 22:39:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000000)=@buf={0xe9, &(0x7f0000000200)="01b41108dcabfdad6967a0a1a4c4086aed2e73bb526ae6a716ab054cb66e7e12f5c9490d3b64542b05119e267078d193f848f6995bdcf60f3e287665afb14ba5a9ff256425f59c63ed19433a67c374cd8071df9b0f740eb8e7736d62f804a014cdc4c4aa31056ad52ed8adedd8a7d71dda47b7d0b3c67a601b57386df5a47e12103d136b95404a645a055b630515669ca803d4eafd78167086fe3d3c05bb14341828321e88e2f0a51e43bd6b4826837c3c05472904ea5cb201bac83e42e10fa8b791e914708dcfff0077cb9df7bb21ba8be28c220e7af3e085e519648d4d3b56326d2c262fde3b0073"}) 22:39:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r4, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:11 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VT_WAITACTIVE(r1, 0x5607) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0x9d, 0x4) 22:39:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) 22:39:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000040)) 22:39:11 executing program 1: socketpair$unix(0x1, 0x10004, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000180)=0x5595) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x470000, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x6, 0x0) poll(&(0x7f0000000000)=[{}], 0x1, 0x300) 22:39:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) r4 = accept$alg(r0, 0x0, 0x0) recvmmsg(r4, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)) 22:39:12 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000600)={0x6, 0x0, [{0x6, 0x3, 0x0, 0x0, @msi={0x0, 0xffffffff, 0x20}}, {0x99f, 0x4, 0x0, 0x0, @msi={0x800, 0x100, 0x155}}, {0x5, 0x0, 0x0, 0x0, @adapter={0x5a, 0x1, 0x6, 0x1, 0x7ff}}, {0x0, 0x3, 0x0, 0x0, @irqchip={0x8, 0x1}}, {0x7, 0x3, 0x0, 0x0, @adapter={0x7, 0x20, 0x1, 0x71, 0x5}}, {0x4000000000, 0x2, 0x0, 0x0, @irqchip={0x100000000, 0x1}}]}) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@sco, 0x80, &(0x7f0000000240)=[{&(0x7f0000000200)=""/16, 0x10}], 0x1, &(0x7f0000000280)=""/189, 0xbd, 0x8}, 0x40000000) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:12 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x8dffffff, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200000, 0x0) sendto$unix(r1, &(0x7f0000000200)="6c1d8a46f04938b41fee6d077a3bd566a00a0e97b94b3a0d8fa1e4a9244544e34cdbbaf3a02405735326e66f01aecc35319d64946ed7d3eaad6d201a8938a1300483ece493fd7d2c95e678219fadf5e7601ed7ba4efbda050837c265a93025783708d2568d74c78b0c8a8032a65d7dfa563d4f6b26f064c6c40d19896e950fafcebf9ab7597accabf5fafe0ca6ac1e5bd2cae21f6d08cd379d088e09ead1c1c490", 0xa1, 0x20000000, &(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:12 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000023c0)="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", 0x110f) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) r4 = accept$alg(r0, 0x0, 0x0) recvmmsg(r4, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) 22:39:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:12 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f00000000c0)=0x2) recvmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000480), 0x1, &(0x7f0000000000)=""/123, 0x5a, 0x10000}, 0x40000000) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000240)="d3041c1f971d0a6845c9f9faa96daa6a3f6e565a50c7ef1996d72ba5756e53c5b7e36cb1a6a0af3216a32f1073581d13faa19f30cb09dca3c75d1a191d7db2e2e75a170962536c75ff56756692791897ca894d4313ba6052725508095bbe743cfef3d201f70ab16317d46d8387bb5180cd2c6966b1855cb3e12402a1bee4c16e31a29c61c054a7256c30d6ec9c9c3f83f611ae7b4164c6aa2acf23c5fba369760bae8b19e9f4fa9387a920418eceac2d2f50c12c6a40a167272f123730539cbac09b4ac72aa7bdf1dae5aecb57d1b2cfd8a1aa4b826aa395dae39bb680edea6c93bda9f6606971a5b3713f6220064ae51a9c8d4a29725d42", 0xf8}, {&(0x7f0000000340)="2c5a119bc93dc083f912bec367d4c5ec014c4cf9555f1704be868922787d1e808be6603404131779ab8a83b15b9702870560a30b45c63290af6e21b7641614d4c0d87814740674b226bfe2519d3917ffa3f66fdc4e9480cd0ba17a106132acd24f8162c5db232e688eb728650c7ac2f11038867b8658e68cedd23844a2e1ef0403e1f75ba5985139c63116adb957866759246f4fb349172f9dcd348145d8c26502bf6c935f4c01314ca585dc4e900c90843f77", 0xb3}, {&(0x7f0000000400)="2151f8d014397aedb010ac241bd9135f35ae2e524c6036c9a763e3b55d1ebff06d3ab9852e487dbff437cf15b1031ef6008b829aaec11204e356d222c9c9d79692c742c7b0aea84756df99dc15026c55d1e4c4150486b73580c5ba49082dfaca4cc98d53c5e269a9f2aa63e6ba80c4822a8e0b6245df43b9848e55c15bd390305f978686e255bf04733470effed8a4ac34b06926c3", 0x95}, {&(0x7f0000000100)="f9e36aea6803b5124eb746445487cf828e091bfe510a9c46d422999ceca2bf8578a7fca6ccf8ef0d2f1a9285c2de7f177fa252ed9685a7d9403d3b523d9372e876b9851e157739146e9f3af169913bf35081b5a18177a222329aa32e39ff21a1f6452f38cc9538852a2ad54e", 0x6c}], 0x4) 22:39:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) r4 = accept$alg(r0, 0x0, 0x0) recvmmsg(r4, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000200)=0x4) 22:39:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:12 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x80800) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000240)={0x8, 0x7, 0x9, 0x7, 0x3, 0x3, 0x8, 0x4, 0x3, 0x0, 0x0, 0x3537}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xffffffffffffffff, 0x40000) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000040)=0x8) 22:39:12 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000080), 0x1000) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r1) sendfile(r0, r0, &(0x7f0000000140), 0x8800000) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 22:39:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x7fffffff) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:13 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0xf0ffffff, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:13 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = gettid() ptrace$getenv(0x4201, r2, 0x2a9, &(0x7f0000000000)) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040)=0xff, 0x4) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:13 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+30000}, 0x2, 0x10000, 0x2}, 0x18) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x100000000, 0x2) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:13 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@filter={'filter\x00', 0xe, 0x4, 0x488, 0x0, 0x270, 0xf0, 0x270, 0xf0, 0x3b8, 0x3b8, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000040), {[{{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@mcast1, @loopback, [0x96c410f028b8113, 0xff000000, 0xff000000], [0xff0000ff, 0xffffff00, 0xff, 0xffffff00], 'bpq0\x00', 'syz_tun\x00', {}, {0xff}, 0x3b, 0xfffffffffffffff7, 0x1, 0x10}, 0x0, 0x158, 0x180, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x8f2, 0x2, 0x1, [0x7, 0xffff, 0x3, 0x6, 0x5, 0x6, 0x5, 0x100000000, 0x3ff, 0x774, 0x7, 0x400, 0x1e26, 0x4, 0x4, 0x6], 0x7}}, @common=@dst={0x48, 'dst\x00', 0x0, {0x7, 0x0, 0x1, [0x8, 0xffffffffffffffa8, 0x3, 0x6, 0x5, 0x7, 0x3ff, 0x2, 0xff, 0x7, 0x5, 0x7, 0x7fffffff, 0x8, 0x0, 0x40], 0x8}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0xe}}}, {{@ipv6={@mcast2, @mcast1, [0xff000000, 0xffffff00, 0xffffffff, 0xffffffff], [0x0, 0xff000000, 0xffffffff, 0xffffffff], 'ipddp0\x00', 'bridge0\x00', {0xff}, {}, 0x0, 0x6, 0x4, 0x71}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x0, 0x4, 0x4}}, @common=@frag={0x30, 'frag\x00', 0x0, {0x1, 0x80000001, 0x2, 0x2, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:13 executing program 1: syz_mount_image$msdos(&(0x7f0000000300)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe801, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200020000f801", 0x17}], 0x0, &(0x7f0000000040)={[{@fat=@time_offset={'time_offset'}}]}) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f00000000c0)=0x657c) accept4$unix(r0, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000100)={0x0, 0x0, 0x2}) 22:39:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="7ae4f93f94851159f1276d5652d4af21312365e49fde6eea8d8637c186978214ebdcf117dc8f76c9dd06056a5918fd000c72e49479a33c1a707dfeed981e04d376cb0239730a9566c6d1d5a2af6b6e0d3e", 0x51) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$peek(0x2, r1, &(0x7f0000000040)) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) [ 1687.034098] FAT-fs (loop1): Directory bread(block 2563) failed [ 1687.060071] FAT-fs (loop1): Directory bread(block 2564) failed 22:39:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:14 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) [ 1687.088389] FAT-fs (loop1): Directory bread(block 2565) failed [ 1687.098439] FAT-fs (loop1): Directory bread(block 2566) failed [ 1687.104957] FAT-fs (loop1): Directory bread(block 2567) failed [ 1687.111839] FAT-fs (loop1): Directory bread(block 2568) failed [ 1687.118147] FAT-fs (loop1): Directory bread(block 2569) failed [ 1687.125120] FAT-fs (loop1): Directory bread(block 2570) failed [ 1687.132124] FAT-fs (loop1): Directory bread(block 2571) failed [ 1687.138986] FAT-fs (loop1): Directory bread(block 2572) failed 22:39:14 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x50000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:14 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x4, 0x4, 0x0, 0x1}, 0x2c) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x9823dd6dffcb217, 0x0) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000040)=0x5) close(r0) 22:39:14 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2c200, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040), 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:14 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x9, 0x100) setsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f00000002c0)="bbb7e5b1472902d7023ae67410bddee1fb08949255783ceb087ac8b7c48c3b932778d432783f09d18082c5dbced2835227ccbe4ac0ef5fc3f1c71e286b044f0b44453a363efb4ec2dda6794b4e5c2e2fe80831d173b3d92a1639b56b4ae3b1e2d1749b02eceeb5a00257056e64b82f126eb32692fb0fdf8eceaf78055e08f82fdf5b8a31d8026530035f5c3a228e5bb2acc8252250b1885137edee47d9758deb8553ce8ef77165cbf2ae66ec1e2e462ff35554696e74d2ec8bed9c67197ebd30b0360797eba3c92259b5260547598cdcc06ab44c89de803b21252bc53146f086d394b0591145fb75a5d3b4af55e7", 0xee) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab4f3eec94048c32e27d04004659db41fb288a", 0x13) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="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", 0x1000) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7fffffff, 0x8000) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000200)=""/71) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f0000000440)) socket$alg(0x26, 0x5, 0x0) 22:39:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0), 0x0) 22:39:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:14 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0xce9144106a7cf547, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:14 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) fchdir(r0) r1 = accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'ccm_base(xts-camellia-aesni,rmd256-generic)\x00'}, 0x58) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(r0, 0xc0189436, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8003fc, 0x40000000000000}) io_setup(0x100000001, &(0x7f0000000080)=0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x2, 0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x9, r0, &(0x7f00000000c0)="d46ddda02a5b363dc7ba95f309525a21cc4cbad940bc1e2ecff58c", 0x1b, 0x1, 0x0, 0x0, r2}, &(0x7f0000000180)) 22:39:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f", 0xe) 22:39:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384\x00'}, 0x1508f2f1b6c58efa) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a60000000000", 0x15) 22:39:15 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x700, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:15 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) recvmmsg(r0, &(0x7f0000000e40)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)=""/128, 0x80}, {&(0x7f00000003c0)=""/107, 0x6b}], 0x2, &(0x7f0000000600)=""/165, 0xa5, 0xf4}, 0x7ff}, {{&(0x7f0000000500)=@alg, 0x80, &(0x7f0000000800)=[{&(0x7f00000006c0)=""/165, 0xa5}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000780)=""/86, 0x56}], 0x3, 0x0, 0x0, 0x5}, 0x2}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000840)=""/159, 0x9f}], 0x1, &(0x7f0000000940)=""/242, 0xf2, 0x10000}, 0x5}, {{&(0x7f0000000a40)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)=""/184, 0xb8}], 0x1, 0x0, 0x0, 0x9c}, 0x5}, {{&(0x7f0000000bc0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c40)=""/4, 0x4}, {&(0x7f0000000c80)=""/27, 0x1b}, {&(0x7f0000000cc0)=""/127, 0x7f}, {&(0x7f0000000d40)=""/61, 0x3d}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x5, &(0x7f0000000e00)=""/15, 0xf, 0x5}, 0x9}], 0x5, 0x2, &(0x7f0000000f80)={0x0, 0x1c9c380}) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'veth1_to_bridge\x00', {0x2, 0x4e22, @remote}}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000300)={0x0, 0x9, 0xb65, {0x1000, 0x1}, {}, @rumble={0x7fff, 0x5}}) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000200)=""/213) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000", 0x19) 22:39:15 executing program 6: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040), 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) sendmsg$nl_generic(r1, &(0x7f0000000780)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000740)={&(0x7f0000000600)={0x108, 0x10, 0x4, 0x70bd26, 0x25dfdbfd, {0x18}, [@typed={0x4, 0x65}, @nested={0xc, 0x7b, [@typed={0x8, 0x62, @fd=r1}]}, @generic="e92a0aa9a1ba4ce8539e374ff5a9ef1f670f1d261fb02774b9e3559d2fe76285a896eada3a4581a2a131e69cdc5106efe34b3489e26da7b00be152632977cb3dcdb1f664791d6c3fb158fb0b3f83d8dec6822d3af66de566716a07541a1ebb5a8504a6e72f05ce9486f0cebce3e64f41c0c3c602b060407cd243bf91b613f7c87de9b9dfc33edb3f6a0a0f484b95d02fba2e64309c6458a6ae71f033a0ae106d53a11966184d4ed99d02b5f8ed6183b0f2f3259d260205377e0c2ec5d505d471ffcecdccaa2cb793e834533afb475a2028e2ab6b51ea5a9b3c8774247bba6f014d"]}, 0x108}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000300)=@sack_info={0x0, 0x5, 0xffffffff}, &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000440)={r3, 0x94, &(0x7f0000000380)=[@in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e20, 0x7fffffff, @local, 0x81}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1f}}, @in6={0xa, 0x4e23, 0x0, @local, 0x8}, @in6={0xa, 0x4e22, 0x5, @empty, 0x3}, @in={0x2, 0x4e20}, @in={0x2, 0x4e21, @rand_addr=0x1}]}, &(0x7f0000000500)=0x10) bind$alg(r0, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0xffffffffffffffff}, 0x0) connect$bt_sco(r0, &(0x7f0000000280)={0x1f, {0x0, 0x9, 0xa520, 0x40, 0x7, 0x2729}}, 0x8) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x100000000) socket$alg(0x26, 0x5, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000007c0)={0x1, 0x1, 0x67454572, 0x8, 0x7, 0x5, 0xffffffffffffffc0, 0x9, 0x10000, 0xaa, 0x6, 0x6}) connect$bt_sco(r2, &(0x7f00000002c0)={0x1f, {0x8, 0x101, 0x2, 0x1000, 0x8, 0x1}}, 0x8) 22:39:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) mount$9p_virtio(&(0x7f0000000000)='skcipher\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x202800, &(0x7f0000000240)={'trans=virtio,', {[{@version_L='version=9p2000.L'}]}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) socket$alg(0x26, 0x5, 0x0) 22:39:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a60000000000000000000000", 0x1b) 22:39:15 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) socketpair(0x2, 0x7, 0xac, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000040)=0x1000) r3 = accept$alg(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000300)={'veth0_to_bond\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x17}}}) socketpair$inet6(0xa, 0x0, 0xa08cd2c, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x78a93f7, 0x6}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f00000002c0)={r5, 0x3, 0x4}, 0x8) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x1) 22:39:16 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0xfffffff0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:16 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffffffff998e, 0x80002) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xffffffff}, &(0x7f0000000200)=0x8) recvmmsg(r0, &(0x7f00000086c0)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000280)=""/161, 0xa1}, {&(0x7f0000000340)=""/220, 0xdc}, {&(0x7f0000000600)=""/237, 0xed}, {&(0x7f0000000440)=""/38, 0x26}, {&(0x7f00000004c0)=""/150, 0x96}, {&(0x7f0000000700)=""/138, 0x8a}, {&(0x7f00000007c0)=""/157, 0x9d}, {&(0x7f0000000880)=""/75, 0x4b}, {&(0x7f0000000900)=""/116, 0x74}], 0x9, &(0x7f0000000a40)=""/92, 0x5c, 0x5}, 0x1}, {{&(0x7f0000000ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002080)=[{&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/88, 0x58}, {&(0x7f0000001bc0)=""/238, 0xee}, {&(0x7f0000001cc0)=""/143, 0x8f}, {&(0x7f0000001d80)=""/148, 0x94}, {&(0x7f0000001e40)=""/39, 0x27}, {&(0x7f0000001e80)=""/161, 0xa1}, {&(0x7f0000001f40)=""/120, 0x78}, {&(0x7f0000001fc0)=""/150, 0x96}], 0x9, &(0x7f0000002140)=""/102, 0x66, 0x80}, 0x56a}, {{0x0, 0x0, &(0x7f0000003200)=[{&(0x7f00000021c0)=""/4096, 0x1000}, {&(0x7f00000031c0)=""/16, 0x10}], 0x2, &(0x7f0000003240)=""/107, 0x6b, 0x7}}, {{&(0x7f00000032c0)=@alg, 0x80, &(0x7f0000004380)=[{&(0x7f0000003340)=""/4096, 0x1000}, {&(0x7f0000004340)=""/56, 0x38}], 0x2, &(0x7f00000043c0)=""/239, 0xef, 0x10001}, 0xc2a}, {{&(0x7f00000044c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000005a40)=[{&(0x7f0000004540)=""/87, 0x57}, {&(0x7f00000045c0)=""/227, 0xe3}, {&(0x7f00000046c0)=""/4096, 0x1000}, {&(0x7f00000056c0)}, {&(0x7f0000005700)=""/15, 0xf}, {&(0x7f0000005740)=""/177, 0xb1}, {&(0x7f0000005800)=""/81, 0x51}, {&(0x7f0000005880)=""/226, 0xe2}, {&(0x7f0000005980)=""/143, 0x8f}], 0x9, &(0x7f0000005b00)=""/227, 0xe3, 0x6}, 0x3}, {{&(0x7f0000005c00)=@ipx, 0x80, &(0x7f0000007100)=[{&(0x7f0000005c80)=""/201, 0xc9}, {&(0x7f0000005d80)=""/4096, 0x1000}, {&(0x7f0000006d80)=""/128, 0x80}, {&(0x7f0000006e00)=""/194, 0xc2}, {&(0x7f0000006f00)=""/72, 0x48}, {&(0x7f0000006f80)=""/88, 0x58}, {&(0x7f0000007000)=""/249, 0xf9}], 0x7, &(0x7f0000007180)=""/142, 0x8e, 0x8}, 0x7f}, {{&(0x7f0000007240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f00000085c0)=[{&(0x7f00000072c0)=""/85, 0x55}, {&(0x7f0000007340)=""/4096, 0x1000}, {&(0x7f0000008340)=""/158, 0x9e}, {&(0x7f0000008400)=""/5, 0x5}, {&(0x7f0000008440)=""/39, 0x27}, {&(0x7f0000008480)=""/120, 0x78}, {&(0x7f0000008500)=""/26, 0x1a}, {&(0x7f0000008540)=""/115, 0x73}], 0x8, &(0x7f0000008640)=""/82, 0x52, 0x8001}, 0x8bcf}], 0x7, 0x2040, &(0x7f0000008880)={0x0, 0x989680}) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r1, 0x7}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) 22:39:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:16 executing program 4 (fault-call:2 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:16 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) timer_create(0x7, &(0x7f0000008e80)={0x0, 0x38, 0x4a33f569ca1dcc8a, @thr={&(0x7f0000007e00)="69d0a9dac912eff5d3823842da859d0c467b532b0045e1e2e8b678b2929084baa4a4a5e84fd1886d3cab1d9de53a14dd7ecaadaa1e4da569fe37b51f9ba764eaa2a65969ec74750a709710c5d1130294d1b3bcd2f05bbe084a7a70a6a912421170b07b0cbe3ec14699bc2141adbc29a4ecf1bb3fa222bf9a0da983b9b1b033a6", &(0x7f0000007e80)="d8f31f8886c94b7e46add6a6c21ba76b673cb96345bacd2ca7663c6a18440d3d9f9c67c21d40cca57a933059359fbe0d2bc5cc7ebde2b518c223df844f2aac03bc67be65de4fc549ccb7aef1f098afce71bb1240b9ceec2e5d0f73053895387a39d090a9e655088781d1e3e070f7126ad70c70124660e165138f16aadbdb2c583aafa833ad3f11d3d174544cade371abbb0a2adcc560b9770ba5b6a60d84ad8ff89a9212c21388d02e643d6094a3738d74999444d54fd1391f98287f27308bb4f0aea5b2a296fa78293272922ec7eccc6489077e1e807775a3e46b78e1607bbd02a9b8c704f1a91e467efd29c079d1f28ee28dd7614ea8db1b57b0a20bed82028918174f3d0f00eb84675799a27abecffd09a998420ae248d270f68cb537fd3af2b8ea7a62295a441c8b441d3e6467744e6c6d7abb2b51a0fe95a46e2dd80d24114bcf6f9e05e2bfd77e32e84031fe67a437bfc2da57c00220a5acfdef2f47589fa0ad91129e1b3242e47b4cc18cda39a67479acf9d1609a69796bc377c11dfb8fe591097dad3a892fea614cb2ca7445653355372e6c2628efe55595ec4aeab1c173a39f3800b1b8fb7e3c351b37259cc1c87f307436f01ed60c5fe554b77354ebfd7296d709fc98bb3aaa9df34e92bb8cb8e187e2d5d892e2fefcf912989896a62d9bf673f202afb87d69098427dccfe902ef99aaeda822d0d80f82e3641e76dadeb316459efac5790091c57f89b730aca765bdb83c46b50b200ebb8345201739ea7d1fa3b2a2f30da383f92187ebb90ce213a983ada4cbebc69d872faf14e3800cab2ec054e773e2ab51cd1319c9c964b36d8e09abae6678892e658e2315d75bc4bf458c25d607aff74c6e19979bae945904f34cdfcbc2997f4f9491cfc97ad60e3697edc676db2e9ad2a16335ce49c15c644fec33c5fcac0f6eb1765ecd30ac24983386f3b6f3df9dd7452d9c195c6cd4b35d6d252e0ec76f8375ca53b25e6c527166867cbd71f0baedcfdd66224b605c0fb9f7b86e1027d1e4857920a6cc6a34ec8ec7f4a9a907364aa9dc844454a1d10a61572c690d546f24778d32b7d4697c14b2ad33bdd6860d38a42557f2920f6f22886516d8195ea17fb8f60b3ea8de52590853b3b46fe77db23d83701185a140689c9f1a2845d8791b645a9c45ed63c4aa189a2ccbea49e9ef5e0000a1a3c50ee40d7d683003ca934e5cbb961b53e27c02ab9e099733cdd022d1e04cf212e0055d024f6f6da877a68301a516d18d677fd3661da624e84ede9c8df8f84317e74388f1c23f677570d2090079715adf9490cb0354cff29d7bdef7afe274c672686ce7738b47f5d6988b9bc77475f4b8fd1a66c5fb895871f343bb4501a58d59d2e6fe6b38e61726eb5c7e6490fa62b231f2668c6631429efa891e9750ee650c00c06c1afbee1c988f5ccc37f3c63506c74470436108e5658c91a43fafb2ce799ce8ad88e89d5293e3e5f28d5b99abde8f8205f99162ae9353083e730788c6ca61bfd93cdd2b46966ee476c5d61c07b8b33c37db8ea2cae0c34182a08c366c2fef535e5505424e9cc2596bd2c21e767b81782429ab772ea9035c58cde673c6c8fa473abbe7e5bea253dc8ba61601642cfc5e2401b5f1627b4bfba0a48991d0de707a285714c17110afec65cc3c0ddcc32493724945a9b24921c1a01c1a433abf93021ed5af03356a26a94485d2f74b213628b17398614fa5cee4f9b55e10248912010db2a5c74cf2f042d84c14cb1f6367087deb32aec246c1befde29a5e44230e954152bf2c2eeeae693a94f51d1f123098f4f30db1e1fb3667a1fad30c22a2da7aa1de689017add40f076e9362103bcb0e4f3305a50f424ed0b5cff47ee40c3a9f3bfcb20073d665388eb794ad5531ff4d4ea13086d54eccb98d524a1a70a889be9e8e08f7b01f50e7b90fd2440bd5ab04050b89c219d4a9fbfe9129b5b186eaa4018a3f83908c4a83154fd8241ba51a544f8d6f9b55a62006190f172786056c65fac41bdd373af46760fa41ce7e34a31b93c383dfabbbfa9e4a66ccdeb0a1d209a0f0b275ac7ddd6f1d5bb336971d3b95aebddf4636033a497b24d2c50a2c26942a00e3060ac64c51e69fcc309d8b09e5682a58c9b09ad08dd0d04558e307a7f0f93f2b99243219cabe7753f43ed9b4da989622b2c9a9cda5181c09bb8f877e180b7f3a03887a87d12e166fc8c51fbc41409d67c0010af18f54091421bbe322ca7a871a1dccfa9ecc3445ca573015fea02ca22ef49e6d5f83cfdea5faba56f16b6749904d1e64ab98f181197f2137edf901ff97ed5d3cb1f42769c2a0bda8be588deea8db56fcba9c88592bd5934108f09d92edee17e49588f71dd89fee7d64f4912db9b532c38b96ccef2b1fe03a41a4408867e6befa7c7607ed31adfe6e8701719806d27c6d1466710d854359321af6324c68e01eb0da363d03cf79fe9264755196a29ee989e0c6ef912636f1078a4b95e0f2468156c2ecf670309d0f0e05323c7ceccada5f8636590cdd211c089a1a393fe9dde345f4b9e7d8bb8eb3d1dbd3b04799581cef53112bea1455ddc6af308ca4e189a9565e81878c269352d721caf3e565b3b3f24dc9dc69d4338522ec9fb6ac36dc638eb89baecfa40f7b3faa3ff3ecce5ce34dd79918c5fcc40debeee55e75fb714854cc4c93c58d3c21fcb28fd8698faf9b314bb863bbcbd3dc88b60d8c9293b81da4cc6f6c7cd80fe1cee044ed4f9360c47c1d24408bca2dd0eecab396c2b48f04ff7d18e9160a9bc769f8e033488017050fe23686da313c83a9728c0cfa5b1fa7256912f79bc236c944d61b8172cff96d6833f0851628eb1e18e6b403c032f8450990f9d607b9ac3b5e6c850fb1bd2a8176bd23e6383fafd1b22999f6c05c9785d4fed19d26ea8ec3ee113a0aecb4955bc0b512159a0e52abef678a908f8ecf5c5738ce36feaf1e81035ada316fabeb50f5a8452053bdc41e5bbd89f54caf154e84801d9921c1b83a2c13e5dfe1455a0e7c58761201c4e2e82f1943d6159e9806b0f2efb621808b4c8c03fa65997984eccf26fa63028d535cde3df32d3f2a91ba8cc1a0c177dd86b6fe523095a6b060b2bb7101b537d30824df6f0ce61c4432ce24ffec03e6858583c15932fd260fd3f4af986e9903952bd3b563f9dfca36dd54b7030a9f487beee44102007bb5d5b11c61c2f16c22705677d23573ae6e61e7dd03f12a0d5db51768830d78e2bc7664bcd0a05ce9012699e77d02ad0d76977c24fdedc51017e53d1e58b49a32fd92d8059a3a6fde226944c0dde5438672ccd34535f6f216e4140ce41064b820332d77593c1e28605c34a1250c4eefba23b52d4113e19fb551f0ccd3248dfa05e1168975d4bada2a7742dec0d5474c25c8be28a00335404fcd9078b4c302c98b6f6ebb8859c11edacb775e52fcbc8f9f462323db4a50ad868a96df2b7da831d892f3dd8407569e0996ab62a9a29e08ddcb8213ee6b561fd059464f47cf1f62f8b579277fa5be17b1ffab937072a7b8a8f8985828c0fc2b33273fb72786443b636f7ad20fa06f67c56a1b57779b4f8e920e6df356e8d12e6e45325125581722c341ce2663fb2832b6d78b86053336a33a974c7a6339e98a73f49dee02df5d35f58e8e9d8b0734739f425469e791e5c1958d1c39fd6ead320aa159328997f966b6566c3a3c79257c083ecf3325cac56879522b7280ea36f4301909700091915ea0784d36a3ff36c8d7f501c27efcbd83bb61799b5e73a55800150606ccd10f5239d95e19e955154bdb5d1f3b671b4e9359193fca13c128f81c8ae9f861acd6edff4a31731883907101434eb53be9069e7d88a841610424f0bfcb4ee68fbc887dea2326919047e16921943c2e7e6113f578964e7fd772957539328bf71f736d0c52217c84274fba5f2dc17b9b956579717b8d00345ed14031dea2f1d255c9cce534436f20aec7ea8666424d56319464fd3f08749d4a63e72b183c5d0f485f6533c9496a4029fba8828d081f71a366d93d002c6ce2548f11d3bb1b3038aae99160776b3f399bc0601a557af7d105be0aa8d5173d493e2da432dabe5538b63243a725efb6e84321471ff656b2f0ed023e9fd537f5723490c547e0bd321f1b3397ef804d397e3698e2847b6a59c7e3b21596c505ada44fdf472b2ff06a034bccd46ec68691990631ea8854512c0f05b09b9111b4777387fa2346c3f21021d9c9e30b7f93111d161cde4f6702a90fbbd609ad46a84bc694c6873037b10cf1f2802b9e65e751d6d999907040b090ddf3db030c52754557ce78fd41e9c4a1a6183e9652046e6b843cb46f4ac88a059a75f4d2a9b1b6565d8b05e6bae0ac91952651f75db3b82ff342097a992bc3cfcd82ef170d2c61a193002526dcaaccc047f8e8a13cac7bfe7b82c4f6d73ed772a7d4fa77246fe45e95216ceece5f87cc1d291ce1ceeaa43ea04466605b0a65445a6bedd67d3e71691a212cabba149345b5cf4a38342d63d5807a68036489342619b001f52c7d9d8737ede3caed25d49ce35edd19cbec3140e91e745c506aff238fce11344dc0f2f912833c261aa15dc12ca1960e3c0a5eeb1b72bec2fa3bc4b58e1e974c9e6df92f6f91bc74df646e0876e0cb294287a5c2351ca911638e56ed740d401384b8a4b164970191adfb29a9f28acac9025784e95ddb5feafe853879dc8f1fdc14daadb0cc8961a42f1617709457fd72bcccd748e6a46c6f084f1ddb0ff7394770f401380765d87eb4cbb7bbef40effb692fa9e5c9e2bb85549d256855ad715a1ccaadaf5d4dc3f5d5792faac871a0dfac67df050d5d0bf35511acdefeb28e1a20d65e4189032c92789767748cbad0219fc7a9b19315caaf39c23404e91ba88839619945290f8b3cbf80ba6dd10341626c98bcd623f74dfd20671da6a2a16985eee32a7b7f17c2a7360fbf37dac211b8593c77da3d33ca5c1c71544eae2fe036e474ffd11fab3705a3b86ee3d0c2b687cdeca77765087340f049be35ec28f661ee48344a121564d54154f85a3940e1afda0b4a3db8968189e6fe2739afa3265cdab7cef77058ffa6adf1955a53a5732b5ca8eccbc6e967b00c32bf262c6b60abb865189edcac2c9da6ba5c0ece9022d8ad5745d811a0f648bf655c95aeca44fc4edf7401b442dffc6e193ecc809444c45e8b3532eb12bc0dbd5f7fc91fbc444a9063bd3c901344c6d301a2420450a9ebcdd9065183927ec5bd3c6734f77cd1de4e00683cb2b83ca65a05837cfcd1bde534b46015c8ee06627a97f26241cc7b66d151f652f890e61b5ca7343ad0be8238709221cac0e5771eb19b531aa3c8988ff7caa691fc69df8470afb60a1ef968146347497f4b88af9c8fd7df8894d1b7e3046b74df6449d36165c5e6a194ca42c14d1f891d688771b43f417788294a742e6fcd055cc1f5bc9b2b44bf54da46b2626639a2e96a2e1bf9e172a62478eaf2129855d75c5c825e47147b3b3606f794a3335e284ebb86be902bfda7d11b0ea4a6915109aa6f1232a344e90f4f1f79934653d3c8d2dd132dde81a7921b5c9f71589f0c3b02bb4db7ec23d4d013201d2e011668aba4e1fd824c16f0ddb2393e971adfcf110db75c11339175f75675e6773b0ef7e6321e6d3e91437f6ed8296e2bdaafe164be628be4dcdca941bbd4e2ab27cdb05603af04833b2d098533ec5ed8a30fced3abceec77f0b61910e0d474ea3856a07c39a7c7181847a4b49f26c781a176fd8d738fd7c46f1c4a45b18bd633237bc04297d6b146f3c8826b8842fd50"}}, &(0x7f0000008ec0)=0x0) timer_delete(r2) recvmmsg(r1, &(0x7f0000007c80)=[{{&(0x7f0000000000)=@rc, 0x80, &(0x7f0000000800)=[{&(0x7f0000000200)=""/192, 0xc0}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/119, 0x77}, {&(0x7f0000000340)=""/227, 0xe3}, {&(0x7f0000000600)=""/224, 0xe0}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/102, 0x66}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000440)=""/18, 0x12}], 0x9, 0x0, 0x0, 0x5}, 0xc8}, {{&(0x7f00000008c0)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000940)=""/32, 0x20}, {&(0x7f0000000980)=""/255, 0xff}, {&(0x7f0000000a80)=""/190, 0xbe}, {&(0x7f0000000b40)=""/14, 0xe}, {&(0x7f0000000b80)=""/188, 0xbc}], 0x5, &(0x7f0000000cc0)=""/187, 0xbb, 0x5d3}, 0x80}, {{0x0, 0x0, &(0x7f00000033c0)=[{&(0x7f0000000d80)=""/208, 0xd0}, {&(0x7f0000000e80)=""/241, 0xf1}, {&(0x7f0000000f80)=""/209, 0xd1}, {&(0x7f0000001080)=""/76, 0x4c}, {&(0x7f0000001100)=""/20, 0x14}, {&(0x7f0000001140)=""/108, 0x6c}, {&(0x7f00000011c0)=""/188, 0xbc}, {&(0x7f0000001280)=""/69, 0x45}, {&(0x7f0000001300)=""/43, 0x2b}], 0x9, &(0x7f0000001340)=""/27, 0x1b}, 0x5}, {{&(0x7f0000003480)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000005940)=[{&(0x7f0000003500)=""/107, 0x6b}, {&(0x7f0000003580)=""/4096, 0x1000}, {&(0x7f0000004580)=""/202, 0xca}, {&(0x7f0000004680)=""/209, 0xd1}, {&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/153, 0x99}, {&(0x7f0000005840)=""/13, 0xd}, {&(0x7f0000005880)=""/166, 0xa6}], 0x8, &(0x7f00000059c0)=""/4096, 0x1000, 0x7}, 0x18}, {{&(0x7f00000069c0)=@nl=@proc, 0x80, &(0x7f0000007c40)=[{&(0x7f0000006a40)=""/4096, 0x1000}, {&(0x7f0000007a40)=""/255, 0xff}, {&(0x7f0000007b40)=""/114, 0x72}, {&(0x7f0000007bc0)=""/126, 0x7e}], 0x4, 0x0, 0x0, 0xa09}, 0x1}], 0x5, 0x0, &(0x7f0000007dc0)) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x4d0cb4f9}, 0x2}, 0x20, 0x0, 0x0) 22:39:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:16 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)="6266f265db2a660500", 0xffffffffffffff9c}, 0xfffffffffffffe81) bind$netlink(r1, &(0x7f0000000200)={0x10, 0x0, 0x25dfdbfb, 0x10000000}, 0xc) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f00000002c0)={0x2, {{0x2, 0x4e22, @remote}}, {{0x2, 0x4e21, @loopback}}}, 0x108) r2 = accept$alg(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000280)=0x6, 0x4) sendmsg$alg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140), 0xc4de0b1, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], 0x1018, 0x20000000}, 0x0) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup3(r0, r0, 0x80000) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000380)=0x0) ptrace$getregs(0xe, r2, 0x1000000000000000, &(0x7f0000000040)=""/55) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000000)={0x3f, 0x8001, 0x1, 0x17d}, 0x8) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="abe27d04000000288a00000000000080010d4eb0ce5b004623d380f7036b3dce4e06717e4bd09b5ef9ee4bc3818f4ad3c93e77182e61c74a0b50410c737e5abd9d116f2fc6ed7877551090f064a810332d9f88c78944a2e4b38b3c5003a6f70c31bb306a9e87104424a4fbf6cf796c2927c31f7b8891e797d056a049b94e6d8cd6c758b5fbae49d41e3584e70c09016ba7c8d6aa8e5373028bc74743fad8414e582c565839217e0c9da8aec77f09c58f35690bba17c276bfeb4f83043b2cf512327cb01aac02adea0b", 0xc9) r3 = accept$alg(r0, 0x0, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x4, 0x8) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000080)={'icmp6\x00'}, &(0x7f0000000200)=0x1e) 22:39:17 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x300, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:17 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000200)=""/123, 0x7b}, 0x3) 22:39:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:17 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r0, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x100000001, 0x80800) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f00000001c0)) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:17 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x2, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:17 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r0, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x3, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000018c0)="aba430ec94248c32e20004008fe063a7", 0x10) readv(r0, &(0x7f0000002a80)=[{&(0x7f0000001a40)=""/62, 0x3e}, {&(0x7f0000001a80)=""/4096, 0x1000}], 0x2) lremovexattr(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)=@known='system.posix_acl_default\x00') r1 = accept$alg(r0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000001940), &(0x7f0000001980)=0x30) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) syz_read_part_table(0x8001, 0x4, &(0x7f0000002cc0)=[{&(0x7f0000002ac0)="525500d1f5cf1388", 0x8, 0x10001}, {&(0x7f0000002b00)="ced9d6e72536ef24f4cffa9f94e2e145feb9b3ca1b74db509b39119a34a9fabfd9e2188498f7ae0896279d1028bfea66015d8a2cb28f9ee3d71d07abcd3469880b5239825d11a6989b043c4a179f606aede9eb5b41edc959babc33772064713e02c0fbbd7b5246b72ad6eb", 0x6b, 0xfffffffffffffff8}, {&(0x7f0000002b80)="1c41f1329f71f88fc9897f6f4d71b4a30b35dcce931adad26922c07f3d394162868332f9c8fb35b292df252ad02a32f78891068ea50f60548d0759239d0b54ed1f", 0x41, 0x1}, {&(0x7f0000002c00)="5d089ac213a34c0ec3d8b177c2aa885bd42803a35c802671af5cd86636dfae21427db059e9acffd03d25bf70d6a7f96a54f0f4c32990792963ddfeda00a4e2d46a067ef1fdfe64d93cd28f1f760404b5c99c924582d8bcf37154e9647cff8e132ccfe5a35aa71fb259f013a79dc9ad97a45fa2244dd2d9f62335bfe87fb25371b06e5e865ec93c037be7edcba06d6d7d29374afa0b781a", 0x97}]) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000001900)={0x56, 0x48b, 0x80, {0x9, 0x5}, {0x5, 0x100000001}, @rumble={0xfffffffffffffff7, 0x10000}}) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)="2f2ae124235c2a776c616e306d643573756d00", 0xffffffffffffff9c}, 0x10) ioctl$SG_IO(r3, 0x2285, &(0x7f0000001840)={0x53, 0xffffffffffffffff, 0xd2, 0x5, @scatter={0x5, 0x0, &(0x7f0000001600)=[{&(0x7f0000000200)=""/195, 0xc3}, {&(0x7f0000000300)=""/226, 0xe2}, {&(0x7f00000004c0)=""/136, 0x88}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000400)=""/20, 0x14}]}, &(0x7f0000001680)="c0beaa1c4761a0c43177587c1a466985cab103f426d2fdfe014d4033cf411cfbcdd5cbb3808c34e3513442ae7b31a3e942ea9d690a2bc91236b7c107c8da037c202a6dee09884884d33795f98aa0dda0de4d064b96b44762c552c826ac4d97780c31d0e97d8f4e8135f02c50c2be8308d85888a27b127c56c99fee3800ea04c5c43e6d5b375fdc8254d1470926918a1928df374953a764e6bba5681a47c175350a519c7a8a639eeedece995219424e3e43b1fbb51d49e3aa997dadf89882e86a05895aa91588f956205914278ff8f5d649a9", &(0x7f0000001780)=""/170, 0x6, 0x1, 0xffffffffffffffff, &(0x7f0000000440)}) 22:39:17 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x2, 0x200000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e23, 0x4e, @local, 0x8}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000280)={r3, 0x1fe, 0x3, [0x80, 0x3, 0xffbffffffffffff1]}, &(0x7f0000000500)=0xffffff00) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000300)={r4, 0xbb, "e02e40769a92c310ebe246d1f4870cf0e928303ab552d0ca514173f4e7abe5362461bb9e0cef6210614329193e265d3de8f5a65b43857fb80ca85bf1818198146f905080e8b06b318af3c422759b6da9910ce647cd118e315a899f4251b7b15708c91d6479d4961c2972ded397063d7bf26ac726860eb7eaaa4e9fd9aba6affe21dfe6b47a09b30a02a733030e5f969999af7ae55432cd34614297e7f4900d01ea2e90e3287190df6497957b4570a0943540fae907fdc2bcaa9dae"}, &(0x7f0000000400)=0xc3) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0xffffffffffffff31}, 0x0) write$P9_RLOCK(r2, &(0x7f00000002c0)={0x8, 0x35, 0x1, 0x3}, 0x8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@remote, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8c000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000700)=@delqdisc={0x4c, 0x25, 0x314, 0x70bd26, 0x25dfdbfe, {0x0, r5, {0x10, 0xe}, {0xffff, 0xe}, {0xfff9, 0xc}}, [@TCA_RATE={0x8, 0x5, {0xffff}}, @TCA_STAB={0x20, 0x8, [@TCA_STAB_BASE={0x1c, 0x1, {0x33d55c92, 0x10000, 0x1, 0x739, 0x2, 0x7, 0x7fff, 0x3}}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x90}, 0x20000000) 22:39:18 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0xffffff8d, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:18 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r0, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:18 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x2d9) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000200)={{0x2, 0x80000000}, {0x7, 0x2}, 0x6, 0x5, 0x1}) 22:39:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:18 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = dup2(r0, r0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RAUTH(r1, &(0x7f0000000000)={0x14, 0x67, 0x1, {0x21, 0x3, 0x4}}, 0x14) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=@known='com.apple.FinderInfo\x00') sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000280)={[0x0, 0x2001, 0x1, 0x4005], 0x7, 0x80, 0x5}) 22:39:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x668616af, 0x280) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x7fff}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r2, 0x1f, 0x30}, &(0x7f0000000280)=0xc) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:18 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) getpeername(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000200)=0x80) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xc000c0}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x120, r2, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x32a}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x1}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1d}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x14}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2c}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x57}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3, 0x18}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x1}, 0x10) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) process_vm_readv(r3, &(0x7f0000000840)=[{&(0x7f0000000600)=""/49, 0x31}, {&(0x7f0000000640)=""/13, 0xd}, {&(0x7f0000000680)=""/34, 0x22}, {&(0x7f00000006c0)=""/61, 0x3d}, {&(0x7f0000000700)=""/219, 0xdb}, {&(0x7f0000000800)=""/50, 0x32}], 0x6, &(0x7f0000000c80)=[{&(0x7f00000008c0)=""/85, 0x55}, {&(0x7f0000000940)=""/54, 0x36}, {&(0x7f0000000980)=""/209, 0xd1}, {&(0x7f0000000a80)=""/82, 0x52}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000b00)=""/38, 0x26}, {&(0x7f0000000b40)=""/63, 0x3f}, {&(0x7f0000000b80)=""/149, 0x95}, {&(0x7f0000000c40)=""/13, 0xd}], 0x9, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000200000000", 0x1c) 22:39:19 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x300000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:19 executing program 2: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) dup(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab4f3fec94248c32e27d04ddffff278a", 0xff3f) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x80000001, 0x20000) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)={0x4, 0x3}) r3 = accept$alg(r1, 0x0, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000010000000000000000", 0x1c) 22:39:19 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x2) r2 = getpgrp(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000200)={{0x9, 0x6, 0x2e6, 0x7fff, 'syz1\x00', 0x4}, 0x0, 0x20000001, 0x0, r2, 0x3, 0xcd, 'syz0\x00', &(0x7f0000000040)=['>\x00', 'skcipher\x00', 'pcbc(aes)\x00'], 0x15, [], [0x4, 0x2769, 0x5, 0x2db]}) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440)='/dev/snapshot\x00', 0x200000, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000004c0)={0x5, 0x8, 0x400, 0x3f}, 0x6) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000200)={0x7, 0x8001, 0x25, 0x0, 0x7}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x60, 0x400) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:19 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r0, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000020000000000000000", 0x1c) 22:39:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x86) write$P9_RCLUNK(r2, &(0x7f0000000040)={0x7, 0x79, 0x2}, 0x7) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:19 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0xfffffffffffffe82) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x401, 0x40) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000040), 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="6313e22555e020332326e7f56aa53b78c251dd3e72c9bedb1d40ddf9392c3c9e0690097d242526fb96baa1afdbacea79a6dd9496ac9e0345ca511e90327c91f62df47d496fb1fd4b2c1ccc8bdba09c943bf27501a161bf016a0f539e9915cba53f0d6f97d81b992244c9d1814f8f9156349708ee7f5e9075bd868afae78a346db500b5e3499158cd05c94e86aaafbc53094b1488b278ef774992b76a7c6196864ba08e1ab5b5b5dbf37bf9f8148b56772646dafa9ad2a1d2a47f90e5958a4a3d4b1517508ee03050daab584eb7035c384ec1d1", 0xd3) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:19 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x10000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6020000000000000000000000", 0x1c) 22:39:19 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f0000000200)={0x5, 0x18, [0x401, 0x7, 0x7, 0xb77, 0x4, 0x8]}) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x1000000000000047, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:20 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r0, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x8e068610959bb8a6) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x20080) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() write$P9_RGETATTR(r1, &(0x7f0000000280)={0xa0, 0x19, 0x80000001, {0x20, {0x4, 0x4, 0x1}, 0x14, r2, r3, 0x9, 0x1, 0x7fffffff, 0xdf1, 0x0, 0x8, 0x2c75, 0xffffffffffffff7f, 0x6, 0x4, 0x1931, 0xad0e, 0x7a09, 0xc26, 0x3}}, 0xa0) r4 = accept$alg(r0, 0x0, 0x0) recvmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000100000000", 0x1c) 22:39:20 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0xfffffffffffffffd) 22:39:20 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r0, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:20 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000009c0)='/dev/amidi#\x00', 0x1, 0x200) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000a00)={0x0, 0x3}, &(0x7f0000000a40)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000a80)={r2, 0x4, 0xa7, "ba6fc6fcad5bdd3ba96d9d14da6f1ebf50d877b21665199221edf5dc93dd4939313e5aa6c899efac170fbf15040fd62ae90fbe36d873f037bd7aaa7f34f3d0233297d78a275c5bc1a97cfb2c84937a84b682a74dd1b28063c2ea6be00b133a237d65824ae4ed7c9958173461f4e79bc9d5cc3fbab580b0d165ff0445be6541eaf8ddf7518c07b6d31580ab8cc7e7311a348663ffe3b1b7aa6abb7455f39d9aae68437a9e9a115b"}, 0xaf) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) writev(r0, &(0x7f00000008c0)=[{&(0x7f0000000000)="ef340ff22ccbc337683a363c63d4d61fb2110e4f19a684be80d24cf5de78b7dbbc6276f589e563bcabb5b09ed8ee1f4d29e86589f9b440f5fc4b290087e7935198eee382cc6dc42eb415196946ca86d92e5506275ccd509434bfcafad2d84983", 0x60}, {&(0x7f0000000200)="6d91c8124a12972dcef63f3b9f034e01ba1504531174554004754be700f6f13dcda60d26fc1b2df6b75246c296c97ddc23994589ae1099b52e3c6ac2e3262ab90673d89c72382cdaf84d11c478f145a1052486604ebea123957685ac02985042ab4fe0e958993bb87eefe3cfeafaa7f833a4dcce4c82a961c90558d6a76eda7b40fd3d9b47b32d96185968cbec912f774eea45912618e465106002c9cfde05121eb90c4325bfced152fbf713e0d6da9612a389d869c67d328b54cd96516815df068c9888588109adef1980ba18536ff854ecf72a4722be", 0xd7}, {&(0x7f0000000300)="043d7203ebf369f6d521d2d0da174014fa82d67724a7cc86eb704ccc55a3729ca3632d55ba47e456bc0aa65fa9613a8919807d8705d7292381197a8b3a89e0bf8661bc9d368999a24830ba08c64f49bbfd6d5f72566d1884a8a1a8f89dedd1754838db4de006c9f13bead369df617461878b22c5405f787ad8b4e39efbc671d144766b3a19192fe38f76b34a8a6dadf52c5183a5423131a77ba6bfc4869698ca1947d5e0e8c9be1eba2c9415c1f911cdad1f479631d2949c5caa9fe04f3beb43e392edc0", 0xc4}, {&(0x7f0000000600)="be2c02cd8c8013381bc17e5b126677013709acdd4095cfef8af9c0064fc50c3a1f01ac1bbe02d7bd29736b61029d68952ff74bf22b82cb737b20505fd672cd507cff734950348ff3411e54a7e0d80f78a2f715d4baa40b7272884c2e6e376759b7bfb3b63484348fd9aeff783a4d08cc55346f628f65df7bae306891375843684d1fac677d3736ef3a7f98748109c71eef239bfd71af0411794a43e500b00b45509a511565d6adb3063bbc12beb57c360df04e093b679e9f2c6e335fd4a5e518cd0a43ebfff6352994671180156e891bd444", 0xd2}, {&(0x7f0000000700)="8827a0ca71234014517a9780fed8b5a2a3dbf17d4eeb10dcde9f5ec4ed586443dba5af77274e386f036dc0ead90775f91dd80d29333855a70bde06f6d7e2b3621c4b2237cd91462b5eaab7baac87e99636dad1876e7adc90f0496d056dc4dd7b6741ab39862fcb42097178e4d62d35e63adeaf628bd4891c4b68a2459f6645046f6818f403a1201e77bfde21975b0459fa7a72ddc56e7f5f0f4511fd6b5a498b20fa01671b2e7b95c9a362e8d2e2ccf8bb106e8d6bc7b023a98ac83bbc3a16d6aea0f54bb43ebc0a786cfc3015c4456dcd4bc7442673cc1a5d2558d7cc3c0b9de1ba7a", 0xe3}, {&(0x7f0000000400)="aa9fea6878fc608cc9fbf568e4c9d92945eeb0e6da7c0f3b4e23bd76397f15e91ac9cd1d4bf722bd1c75a3eb4e76e9866f91a087a8e7af04a6795d9a41c9c3f39623eb29bea527b6294338adba0723", 0x4f}, {&(0x7f0000000800)="d95b3543cc3965b2bc5897199e7efb78aec0e124f836da675966aca6b8cf2cfae3cad0a0dce861282ea95bbc70695187c2b270d8132c2427f07191283abd07344f12d83a440d8033d8d5c789199ba66e6676dda13a6072a133d18582a134b582fd3284efc0162b443944eec96afdd68674cf241c7f31ff1876088ef7b82bda86907e33323992df1dd5f77a8784eaadbc27879577db443a2f83670a3e93366a08e59ce387e59f282a990012d9bd39", 0xae}, {&(0x7f0000000500)="a23a51c47e10977ff33f21154a53ce4e23d93770455295fc2c8a5a4860770992d625092a42ca2fe7b6a1f5ac29b995818f4ad6e46ae746591ae652ef60ef33c954925192ee384a56bbdf3448f4cfffafa9e2a1a5f5b21805327f9f4c5a33910b0ead011a5b9a43a89dbc4fcd4333e50cf8c4", 0x72}], 0x8) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000b40)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) socket$l2tp(0x18, 0x1, 0x1) r4 = openat(0xffffffffffffffff, &(0x7f0000000940)='./file0\x00', 0x2200, 0x82) ioctl$KVM_GET_MSR_INDEX_LIST(r4, 0xc004ae02, &(0x7f0000000980)=ANY=[@ANYBLOB="0600000000000000000040000000"]) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r5 = fcntl$dupfd(r3, 0x0, r0) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 22:39:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ab4f3fec94248c32e27d04000000288a77dcffc1ebab3943ef33c146f1c173f1092661a4eb940e2bfa639d26fae519abfe5deb62d383ddf32cb32dcb94444eb6f115c39d83fdba863c3a8f0a7051ea3bcf0b12aa1346102e5627b183e1d4a1add97ddd2cbecfbd664b7a1812677cbdef796a61d3b263c4cb18df076df4f966df194ea74eefeb8b965aa297a6ba8fd750ddfcf60cd108d48fa86c8c6d3ccda95dfc652b12758c", 0xfffffffffffffece) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[{0x3, 0x2}, {0x2, 0x8}, {0x4, 0x6}, {0x2, 0x8}, {0x4, 0x7}, {0x4, 0x1ab7}, {0x4, 0x8}], 0x7) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000200000000000000000000", 0x1c) 22:39:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r2 = request_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000380)='\x00', 0xffffffffffffffff) keyctl$instantiate(0xc, r1, &(0x7f0000000240)="7fd4a1042e49928784926dbde41cf7a6f92b6f243b32dcd1255aa7f35f4ddc382e8295399c6b144c4969dcb021f43f92ce15b3d1ac3f8b476c5689c165204cd6b667086087f8bbd48d654606f91c7f2143ecbdd0fe5424d151f9c2017a1112cae2b71cbefb4418d666283acd1a1c93b3d124df8419d6f729e5d2fc493de38ce4ebc6ad304d8223d4de67b8c097ec933b26842282ceb61535dfcb3b583f0e955be4cedbfd397d821a3e985542076d1c7e2f6ceecf880fdad0ec6d", 0xba, r2) r3 = accept$alg(r0, 0x0, 0x0) umount2(&(0x7f0000000400)='./file0\x00', 0x3) getsockopt$nfc_llcp(r3, 0x118, 0x1, &(0x7f0000000000)=""/1, 0x1) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480), 0x2a8, &(0x7f0000000100)=""/123, 0x4e}, 0x0) 22:39:20 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x5000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x10}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:21 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 22:39:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000001000000", 0x1c) 22:39:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:21 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = geteuid() lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', r2, r3) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000002000000", 0x1c) 22:39:21 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200000, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000040), 0x4) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$nl_crypto(r1, &(0x7f0000001680)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x80008000}, 0xc, &(0x7f0000001640)={&(0x7f0000001500)=@del={0x120, 0x11, 0x210, 0x70bd2d, 0x25dfdbfe, {{'drbg_pr_sha384\x00'}, [], [], 0x400, 0x400}, [{0x8, 0x1, 0x7}, {0x8, 0x1, 0x6}, {0x8, 0x1, 0x6}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0xffff}, {0x8, 0x1, 0x7f}, {0x8, 0x1, 0x20}, {0x8, 0x1, 0xfffffffffffffe00}]}, 0x120}, 0x1, 0x0, 0x0, 0x41}, 0x800) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000280)={0x2, 0x0, [{}, {}]}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/83, 0x53}], 0x0, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:21 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x50, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:21 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) socket$pppoe(0x18, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x82a0, 0x100) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x5) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffda5, &(0x7f0000000040), 0x82, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x200005d3}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) getrusage(0xb54d3f0b7a64beec, &(0x7f0000000240)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ab4f3fec94248c32e27d05000000288af39441c8f6a889bd265606b460b75646abf0e6c931fe31a6bf8be6eaf7d629ef54e827e3e5993513d0d4ad04ffffffff734cb06dee0c36e9d01de7b4187cade22affcb1ebf8eb133491b314e0400e0be46668c4614386aab97b531b44f3c63661dbe81451157a892", 0x78) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x10}, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000080)=0xb0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x7381522b52fbb6ca, 0x0) 22:39:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000100000000000000", 0x1c) 22:39:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/83, 0xfffffffffffffc49}], 0x1, &(0x7f0000000100)=""/123, 0x7b, 0x6}, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000600)=""/4096) 22:39:22 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setns(r2, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a60000000000", 0x15) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x100, 0x80) getpeername$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000340)={@ipv4, r3}, 0x14) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f00000007c0)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x5, 0x1, 0x7, 0x2, 0x0, 0xff, 0x40, 0x0, 0x1, 0x7fff, 0x1, 0x0, 0x3, 0x3, 0xad8b, 0x100, 0xba4e, 0xbc, 0xf9, 0x47f3, 0x0, 0xee95, 0x800, 0x80, 0x5, 0x1, 0x6, 0x100000000, 0x8, 0x100000001, 0x1, 0x8587, 0xf6d, 0x7df, 0x7fff, 0xffffffff, 0x0, 0x7fff, 0x6, @perf_config_ext={0x1, 0x5}, 0x2, 0x7, 0x4, 0x5, 0x100000001, 0x3ff, 0xffffffffa27819a7}, r4, 0xd, 0xffffffffffffffff, 0x2) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r0, 0x0, 0x0) recvmsg(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r6 = getuid() r7 = getgid() getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="6801000000000000070000000000000000000000000000000200000000000000f57400000000000006000000000000000300000007000000030000000000000001000000000000009102000000000000040000000000000006000000000000000000000200000000e20700006000000001040000f9ffffff07000000", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="400000009e2900000000000001000000000000000004000000000000000000006e0b000005000000000000000000000000000000000000008002000069000000000000000000000008000000040000000000000007000000000000004000000000000000ff01000000000000000000000000000001010000000000000200000007000000060000000100008002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="370a000008000000000000000100000000000000200000000000000026000000ff000000736563757269747973656c6674727173746564046d696d655f7479706528656d3073656c66400000"], 0x168) 22:39:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:22 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) unlink(&(0x7f0000000000)='./file0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000001000)={@ipv4={[], [], @rand_addr}, 0x0}, &(0x7f0000001040)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001080)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001180)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@dev={0xfe, 0x80, [], 0x14}, 0x4e24, 0x8, 0x1804e23, 0x1ff, 0xa, 0xa0, 0xa0, 0xa5, r2, r3}, {0x8, 0x8000, 0x1, 0x9, 0xd91, 0x556, 0x7fff, 0x6}, {0x8, 0x1, 0x0, 0x9}, 0x6, 0x0, 0x3, 0x0, 0x3, 0x3}, {{@in6, 0x4d6, 0xff}, 0xa, @in=@local, 0x3504, 0x0, 0x3, 0xa24, 0x8004, 0x2}}, 0xe8) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000200000000000000", 0x1c) 22:39:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a60000000000", 0x15) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:22 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x700000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a60000000000", 0x15) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x7ffff000}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x7d) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000002000000000000", 0x1c) 22:39:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:23 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000c40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0xfffffffffffffd82) r1 = dup3(r0, r0, 0x80000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000580)={0x1ff, 0x1, 0x100}) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000000)=0xffffffffffffff37) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000b80)=""/158) sendmsg(r2, &(0x7f0000000ac0)={&(0x7f0000000180)=@ax25={0x3, {"b0909393a2f750"}, 0x7fff}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000200)="3784c81ff9e714ef93870d85229fdc369ce3f2fa021c478b2d51b520b876e2d02444d6164ac8ac462c550c001f42a7d2d01e5b4e1c33a5a6be6247350271edbcc4b7cb74a353b8577fed7ece09823805b11f5fe9ac976717ef5d19e5229f721cf1ee44be85ccaabb8666090dd9a3dca135ebe0047a176cc286ba2efb2406cbe186c2878937964a8faaaa9713ec2e56e2ff59d33c19872b16c8e2", 0x9a}, {&(0x7f00000002c0)="f8d54c06a81f661be35db7aa754bf74ea5ffedf9acf6275c115fa3d91704c494c4414c85", 0x24}, {&(0x7f0000000300)="594cde35254891567dd654cfc2abdc71abb97b1a1b0733e46278097087f740a2f4ed2dace145cfd21fc52d075c56213e159c1d8802c1378b9c5fbe53364073b8aea370a0523f868c585b89b755f2ff17d6bea31979b0e3856e24ba8f2d7ac9ee632ab5c06332ed046b4b577df4fecd8a44406ac3a8b82c49eaf12380e0ea55366cda51e10c5cfb9a918b05832253216a9fcdedb94ff2917a", 0x98}, {&(0x7f00000003c0)="5c7a10cfa4fe5cf9753f2d6ab29d9bf33b42cee07c21cf62a44dfd46a37cf07ff775466bd3e2a7da449a98a24b76a7b99abbc5feb5c2f33188ec410453e16f82612647867c588845f67a615e", 0x4c}, {&(0x7f0000000500)="e86e455c50c9f27f8b5e09f29802dbae6366b9d4d8f457246822acdd185d725025ea770bbc1cbebee2ddce55c019b46c0ea2d3c75ffcca9501cba247ea729eb7aeb0174675d23df9a074b6689390c9e0cdd9264cf364297b566d05c128d0cbc91376172e2eea9889044550e7b009cbc0627f7fdeb001bc897ca033e52d93", 0x7e}, {&(0x7f0000000440)="0f", 0x1}, {&(0x7f0000000600)="550fb0e63e6d32124a95ba43ded970d2f379a21e00e8de2cccd266f02a8c000eba45917be8c90fd1a234450a47c9ea98961d59d7ea8998b401a9e37a9fff62ec38b1acb397f85e15bdca5bbb68bd546a1d12f22553381a2b5194299bb07d10c19f47168a2f31c40de940570593acaa2a877789b5803696844143c1f1d2b079059a2bf9a5db4234dc5e9151bcb2630b0eb77842b7373d112bb3ad1f68e5bc3d099576", 0xa2}, {&(0x7f00000006c0)="3829e33a199f9f18a14c49f142ec43de45481a7419e46ac34b80fbd02aa95e569ed11b52ce5eb3544cdca785644c1df1a31484d26e1208dcc02f73d813459f5b51d867cda89a3fd4905ed8b763b3bc82f2d6e27b762f415f4996b64e41898c726843f7bb4fec61782d7a19af2a4c5053db2b9bdff38f658c63a306782f4a9ae1339c05662f8e09f28d8a4b5445fbb949298b3aaf24e1bad163a353a2ed881d71aea82db12db18c69e9c3baf119b37a9b17c1ae1f79efb85f27b415d25f1ce07d6993a3ddd409c07385a1a091a1899c4df70982a619463bf1961eb22d4ddb98", 0xdf}, {&(0x7f00000007c0)="4d2350d433d53b311e0cf4166ad0f701d5b7740ac844ee58a69e4edc98f563879ae15f29fa509b5964b4b350014af087126e7dd2bbeb16bf5ae604b641a205d176d007b61d374c33cee22118b025b7dee3c795b4", 0x54}, {&(0x7f0000000840)="323dba2203d62d3f9c7c021e766b70edb74027e848b0079dc4c3748444e6060d90f97ad5e37480717b65d0a4373b90e3ae6deb6a7ead3e54227433e53ea6c18b1827dd925f24fc894af350e203728458455a3cc9536b93741538a1a2c68fff59d30503a17a823094424d6fdc215f2dac7b34e3223152ee45a7ed4fdc12dfc17c8e7928660f01c99ab90949d4f8b5333397389787094b023ae06548c06fb03afaeb0086b05bd73205851606db24da5e5183bb81b7484ba6b3827dec0224f9b7ae753b930b45a5c21d67f060ea743f6584adacac10bc61cfbd489ca1c532f3529501186a2653fa668c79214b1f57be29c07ec26a856e7c3f", 0xf7}], 0xa, &(0x7f0000000a00)=[{0xc0, 0x111, 0xfffffffffffffffc, "d47c4c125501f913c0262706e8a99548c9d97b19e577da8e2ed1238ad9d2747d307ebebee6d6eda7ae9de4851eaedc436c18d0b75fb7c37f44be1ba6542f2f68bc94270c94f2f38f86b39d5a15d7f5ce63f6ac42ed2d5f772350157a601975cd14dd980beec5eda06e4a61cfd4ea31debb052e3fb2861930ea5350a18df512eb3263bade61aeeae40a2bff403aaa0892d8905c521d75e5a428c7871ac0963a3e10b653e5e36d7c6baef0fdb9"}], 0xc0, 0x4800}, 0x800) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000b00)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000", 0x19) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e21}}) 22:39:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000002000000000000000000", 0x1c) 22:39:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x12000800}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x124, r2, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10001}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x435}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3c1f91cc}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8001}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x20}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x174}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004000) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000010000", 0x1c) 22:39:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000", 0x19) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:23 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="742633372830808009af6ee85b248158cf9cde09c348225972bd312e9386fadb53f387fd118ad4444dc473d6bb243be0948c529217d13a24ecdf6a307ded8ec10332a0405e15c5e536cfb23972e555516f60ce6407c12f85a0ba1756be6726e33450fbe17c69e0a10e01d5e1d023b1ed8a5861889bf1fc8ce59c10c6c7a79a4be0601ad204917b49c7fb1c0e1e313ef0578c328b16c65d26ebd3ca9dee72152db2106498483f7593171005b007bd7df1521499c09f0587ee92da667dfd973697978ffd44e9caca721221b36f", 0xcc, 0x2}], 0x80, &(0x7f0000000340)={[{@sysvgroups='sysvgroups'}, {@inode64='inode64'}, {@uquota='uquota'}, {@noattr2='noattr2'}]}) 22:39:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) [ 1696.702434] XFS (loop6): Invalid superblock magic number [ 1696.757367] XFS (loop6): Invalid superblock magic number 22:39:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='eql\x00', 0x3}) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0xffffffffffffffff}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000020000", 0x1c) 22:39:23 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x8dffffff00000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000", 0x19) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:24 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000013c0)="fab8c126c7317319a1ed60f0f77530b9190dd7efe0aa62753f9d5d7c2be70d83d1b908b3e2ab194d5f488e31c4615095f99929a5d172eb5def34d18dd6e69a4fbd8696e14b41c83d229b5bf14d530963baf95f4e11189bd6a61e70dcd484cc0cbd59e80fc9db6f1d3c11d02091e7e5577e979a7c83cd37647f639d1091ed3601f4646883c00b02624e2feb919e3f7a13fb87e918bd15acf9d6e8e7e22a86388ce9bc7d69930dc441be10461bf49cd971ecfa8841c3b7baa8224fcbacfa54f4c5faeabb33bcbe2cfc1d2b982f61d90b08bf0ba6c51e51582dc93b549f1db055809e1e1e8dace801be14127c486b6377102e1c3f5ecf61c8a4a4e5faf88f4d915ec35bd6a25b37a78acee45a5847670a38ad9938258abff61f7b626bd0c939c35796588c712c94707d18f8992559c39b900676ac4152ddc66fead3e0617ad9959c055951f8eaf2252c86f8d5bc74f3f0f1266f0e62d0b736098c56320163bed0767477e6b71b863ece0ecf4ef05ddd343af4197e696899774e26ff5af37a04a41686111e9458d6c0bf6190ee7254deb1a9d7b089a364549755f4650126b68a1fe544787578d9c1484d3934fdadc76056ebc65ba1d2ba026d92a6c6d275a19557f1c7aa62af24f707b58a9eb9ab4d0955c9a7cb0e6c2047178d84b81d94bc47751bce86b34011feb17300cecdd0e9e4ab718fbd505c7e047534492bd9d96f563641ae1c8e548c82712d3dec24708ca65d970fca195494ad4b404b6deae147d94171b6ab306ebd224ef364642c3642dc5a76c63307bb466333361f6b0d6c203ce0661a653f78d9415a9d473e91c4da777146d477de027ede881501ba471c697878eaa9e895d69344d1d7f6ed462a779377e9844b66c6617dfc7d6c6b4b7ad86a6006f4fdcd611481e6d696b5311e55ca999dafafb7ef074334b0f4331ec559ef2e6f306e92d5e52d92b9f150574e7abfedd9dea3c787907598ef6baa11d132936d1444af6b6bad2a20aaa477e6645c86ecd5886227e57c5c5c871927ae4a98840a4a2e0f4ecf7723a965bd704abbd4375b70a3b89e7156bdf8875be7b0f8562271942e0c26e36a424533458f47ce7548c7233c365d510c462b947d08991fc4806b5881cafed612c0aa686ce39d4bba52e2007d5d704fbf164f182fb8044ae6985cf894e4c1b4a3482148499bb378cf974d0e8259c40fdaa2e6fe82423720116cd534a1ab1a393a266856fa5b128e8374b12583e20e209589644c3962bd10633aeb0d4210bd935bd2fb14760691a53d73fb677ca03e1f3edbf1d1aa7716abf8ea679ef600a7a1e22d70baa9caf092b949e054de3fd0628d1b361f0f2352ba0c4a366250c55ae20dcf43a6beb99b6eae66cd622dc318d304257947aafe6a6068019c72e7a6f77fbc3d1bbd1807990329492de2fab8b3b3230f799dcbbe970045f31d9fe8193078329e0a32bc59947759ad0d38f0cfdfe1e5d7d5ecfa1705e863cc398fce9ee6824914fcb53336b4e7281a4a122390361e1d294e2f2189785992306eb186309e814e71894fe7fc88ed2f920aebb5e4413fb8197c6b74227423ce06d8fb2b10ae50924cd024eba7b2c3c76f03e4febb00afe78566b3c4e43d5a68c5e567d0b451cc42e47cc8b16698ffecbdb1b14149cc03f68f091a7f8372b1e11dd915ccbc181860987839103b3bf12369303b16d403267f6a427174f0e6590a31348a3c741564a65ef22d0c564dc94e8434baadb78cbc5f094db0120a3373d90f6cc15ffa242d55ebfb10fcdb1dbf2b019e4b229e96fec3f0ee10f136cdf3f257b85e518c8d99e0b6c86aee220d11c033ccfb42b0a0c1edcb8d76dccd2ac60ac6c152e75b3b8d0c05827a63e07b626e4fa1c1f2f58363dea59b15dde1814c6b33647922725fae42c78e0ba06b454c91eda0126925a1f43f46f9e53797f5df0fa02638f8dcc8ab82fe4cc2fbbbf0e96b962915328962ba96bde04e2d84c6774432c885affc91127091eed397612ff7ac4ac563c5410311e292fdab81b5b07f9848b6469602fd704b18d852b633fc42482e2c5c6f90cbf2bb4797fa7b485c4d5df99dd2e7310e3d4ce8c13ccd877e6acdbb56b86d4b94abed0aab2c8fc966b104399276cb6b4ae78e5b1ec4b6a3af70e6d576e9619e19620847bca587138715aa92a0954cca40782b33aa97dae1c8863cd3ac979d21ef1ab416d5d88e40dc1a5cf6951dc19d92ae9131714c30783bd92dd829ee15002f3fb2864d2c79ce41e4630bc28868e9753fa0fa63b31d77e5aa9699165e31d62583bdbb645aca376b8a40ae8d892b9a9ed4934a78b53ecc0f4e8d1cd91708d8beae8358eb47d901a353b6a526f8b3180babcf93731384e16bef918e45eb15e61baf3cbfc10f5c0fbbc2281bfb4c9363c252826be2e4a809a2e011a2346c2bd741b689c8834c752b56ca482129576d1ee15d3e8c6c83a22e0c23bc60dd9c8ee7e0f5c3b39c85200ae1e630b323276cbe17d78f6ad35c9328c9536fb5ebd3c0986e417697769e472955918ec0eb43a57ab67afb8180cde1c304ab7edaceb76a50f0bfe26da51f87c13bd3b7715ee80bb3869579a743e12fdc092b9f91b143d44d5af2b8dfe2845663eb15e89a9988e9392d842aae964908968e6de60257e527fee8392f8f0a55eaea6ad8014ef767ebbe6f05398626527cd8492bbe0caad039cc5c8c9f20c0558269931a154e6fc0724366cbb305d24e27556312a3586619ed367be9516aa950f5052ed722f507685e74945d76cbca627aa25c4cb0c82e6572345801987c51197c9ee9b28138da2d49f382c3b5d68a7f076515c26172365ce0cfd8781b1fda990868a5505684e58d991ff95187b18633e750028e30f516e86870cff96a8d16541143a7619c25fc81d5be08ba594fea2cd1436b9ebfba1d5ad4716c72c2937cfc153d1061a41cadb5e8788e3da8a3aa72a7062c088f0e29cb34a05e73a024d4d3ab968d0e6431087dae1f34e84dd6a3992806d4d2ea5f83fb26029c36cce7531e5d90ac38008697a4af6776146dda27e536b371a7acade69589dad9241c0e5fb49259f2a622532a6b6dcc7bedbd116cf0cdbe42c0f23e3d84c0a182185101324b1d6939c71e66e0cf0263751ce3b41ec6c7dbb0c4703854393e84f75219db25959ae62d9cfb3d525a001008eb4c11328fe68bec76cf5a4fe20607a1061ba01d6480abb9cb67886ae974eb7ba80b8e335f7a745737df9c70fb73b5cf361048c1e343a2122aaa2c42a94c2bc252654c71bf5eb424b903d192275916749283dd9b5f58280eb3bfe9128a78b5cfabfe2e171e2a2161cdc282b83b9cc96e51f14529ca7d89ec5cbcb236968a4b77eede738067fc75e9fcc44f04c8161d60ab80c475ebc27d976393d5a22875dd7d98b74db535e1613b2b13ce3d02f4a027598212faaea6728628180a96f1480f7053cb60f08e919c849137d396ffb8c7be33cca095c354b9d42b5b8cc726beee26adc7e84a3be2abd620c9754b08ceeb9ca5abee0909b131b3b213689f40f8ae8931d93f2ea16de311eba9a50d8c265c9ca80b0c67b4f879a602c53e1bc1256cd3550beeef45b9e4be5d23cea15820f0d5cc12b4de2865a94b7a2de604cf6f08124501dbab3b859fefc3f3d892b5dea42d5bceb666ee5d4766a5f1defedb1bdcda29680d5ca3c56deb7026f645f25a512deacbd9c71f86d072b752a70f525b961af5037779101b7f171d52d29b9e075a44e17bf5c892aba4d78522c0d1da861ed8b9fa6bf1462f2d1b561db030769ae2503f2b3349ca73f2c3df47c184257a83ddcffc2c85a1b5d27a153742d6ca91a68311779f349c241eabe8c34051441eedb00c0a7039bdc9298cbe8ade87ee295b24f2951a06a7cb8fe4d6a66119fa6f45ff0980d2d340bc22d95f5ff9fd281ad1d2a63f38f4c1fa608a343ed3117b58a1495ab978fc34733b3a984103c3db63a78524563e3a0caef3acdcc3049ea4bb960cb881317ba603156dbcb2811f4353675a2c2026704522b33bea01453292c5e78f796d00454c794abe35ff40c005e2bce2f6ca8572dd4f7f3953f990e0baded6f93878fe384294de075154c3a282072acc2a3ec45bbcb22daac14a947ce7cacaaca92eedb42647cf5dda56b4e82bf1fab05b9796ca496f3ee1db402f3ba92b698e4e6d425274ecd4bf856100fc21eee8d5ce1525f7032aa12f37c86dd9611609956184f80730110e1b6f38c80867627e9931d07f5cfb3b618c1f942d07fccba7f3db404a50e70906baf8a5e4630e9a979e821c7a8179b2424bf16af6ea46388b249d0630c7865e7ef2c208d4d2ca4317d516fa4e3c50ee47669524082981ca89554c0ca1791db8851375520f0c6c90583cb8a78b3a2dd8b7c7802552c217f1dd98346c4fc7de28349ee4900fd159ef628f9b85d4b53ec51f4d83741a02e571b612eee4b9cb2cc20edc5c219ae801abb3a30cec57269debe05834375892128a1a70ce05e900e15ba1f19d9adc495a8cf7257b6094db126ead744fb8558f0307cb241969f43a90b65bae07d2852296fa585359273562d8445e8c122d705358b809ded8468e36128242bf8109630ce0bb5aea10564d8ab2d4e8933d300aa28e863a38949cc1c68b2957b8aad0c4a3a1de1ce61e0f8914c3dacce502b92a0ade9278669baea21c364c2d58823441c17cedbb9c9c3d3acceca40967b5025919f0b8f423df87340c067a7a06f173acf653ddee7cea67134944ac9c5cbad76c097cb19062bc8b7acbf650b1172779237bdde9c383d86c6110c23fb368dcb8a18a2afb39bd48148209297900b88e8637f6658df7da682c1ec579206eeb9f61bf3fa497b86c243e68fd2ab2589c0bb6579ce579e54691f4762e2294978cf2e2cc6f0f421b71937ca5e1545d2ce37490795a72bfeac1ef9fdbd1890fefaea898b340006df491cc576077f6b74bafe0d5d0f35a8285331c9da14ae8402d040915854bd6aa680419fd0b73d18132c3eaf2183594893796cf2b670a36ca0a33f8da0c6dcf0b6d6b546161fd01979a524703b64bf9c767477cc1a6a546d87b6420f00da3d885821c2194446bddfac079a07d0ac17c6f5125f45fe32f4767069a9a1e7ba8c2fbd0cabc34b7fb524a6694019e3b7ba4134f127f370df47e399ba3821e6469b3680e618a0834e76e40317570b18a6bce41d04fb89750d3f771df95dd96b0b9c0efe343e70aa53b7dff33e43dae6e2bcffcd37013b07995d6e17ad9c25d786f8dc31219b3e0bc545757327c1c01b4255e72d2b7f76732e4a774aab0588e925fcc28d2d8a6a86a079498eb4ccf4281b4ebb410017e247efd62d60f7fe73968e27e74f35338069e83a68a31ca9ee65fe0d8ced0e464aed91de17ff5817c40821b3d5fae50ffc365f7c1917912057efca268285ec69289c33a415f24ac7fb8560e0402a6408d0af7b8288897fc6e84fced5f327092736e1ff640c68efea9aa209947b6a8e6c2b5256f599f1fb06a5ec11d87dee1efda46497ad51f30694d2ca81a0d1d7aebc121534440ac911ed7c3e0e0566f05ab9ec5d5208c77a8e677c9cb7b23c265b0d7eca3574d7277d009898c0496af6bcdaafa53e9e81a5beebcaab8ebdd5f5f90fc8d7c70e587f9a153e5d955595046ea8614f07e930abf0f34bd8cdf2097301bcb7a705c5da72c38378f85f8ecc3033a05c56ee42702838bad8f81254ca421353fe621a9b0bb731a353ed54d5c63bb8447af34c1173e1624ad6a556f22f34063610a8f2e7b0e636911f59af4db27219defdb95ef06b13f21aab9befd10"}, {&(0x7f0000000200)="2b1ef300b9f28c0e04824facb0918935c2dd2f55e0f9558da112f4d0d398c83789907fe2f177728979f0c1dfb4227e4c781229c05b3963d2178b76cc9028f44935503b434a126f71786d0377a1e27464f6ac67c7991cbc11b20fe466b865d88b263fe230b21b4cf04864828b47eb75e8590fbb1cebbe540c12ef84324eff6679280262f5a6344fae5d8df7255dfe2d71dec70981faa9812a7bc0b74e8dbe67b1d1f3bafb5fbec47f2fc0be295b20f1e7e8b21b4d68cd3d3c0a"}], 0x41, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0xfffffffffffffffc}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000001000000000000", 0x1c) 22:39:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:24 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = memfd_create(&(0x7f0000000000)=':GPL%-wlan0(eth0wlan1\x00', 0x1) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000200)=0x18) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200000, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x0) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a60000000000000000000000", 0x1b) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000100", 0x1c) 22:39:24 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000340)={0x7, 0x0, 0x80, 0x101, r2}, &(0x7f0000000380)=0x10) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000200)=""/226) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a60000000000000000000000", 0x1b) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x7fffefad}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r3 = request_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000280)='\x00', 0xffffffffffffffff) r4 = request_key(&(0x7f00000002c0)='pkcs7_test\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000340)='.#%\x00', 0xfffffffffffffffd) r5 = request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000400)='\x00', 0x0) keyctl$dh_compute(0x17, &(0x7f0000000440)={r3, r4, r5}, &(0x7f0000000600)=""/4096, 0x1000, &(0x7f0000000500)={&(0x7f00000004c0)={'sha3-512-generic\x00'}, &(0x7f0000001600)="1b2288e4936b45ac0e20a896078a31ce2844f580cb6e32817df2e56b6694ccbc1cacbd3c29524d94b1d78542181d69753cf588db6aed9588f75023bd2177648fabb311d3684a5f7bc12aa3fc6fbbbf008944f5222020cebfcd76f3ee1462f3efd64debfe40ffcc4c839da1386fc51a8b60270a646df791b3a104eefdbe0806117a8b36677873b9c03b7a0f72a46fbe04807fb4abf50b92f97805c5e2b5da5b6b945eb201beadc19dab86e353656e5896fcf360d5d2bffdef9663be13d9e57faca4623a0c6776e4680590068a0934de30d75c4b0b5af12ac32829afe54efc7761390eb3ffec", 0xe5}) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000040)={0x9, 0x4, 0x6, 0x6, 0x8, 0x6, 0x1ff, 0x0, 0x3, 0x1}) [ 1697.978002] Unknown ioctl 21510 [ 1697.984931] Unknown ioctl 21510 22:39:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x10}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000200", 0x1c) 22:39:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a60000000000000000000000", 0x1b) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:25 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x8, 0x101200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000003c0)={0x4, 0x8, 0xfa00, {r2, 0x401}}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xa000, 0x0) ioctl$TCXONC(r3, 0x540a, 0x8adc) r4 = accept$alg(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x100000000}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)={r5, 0xc2, "a73ba0023fa098a5fcc3125096c8db87d767abf7f98c3a4d1e85a1bfd556729bdb450e46935beddff5539db2e59994e9053f4aa36bf20798b081b011c26129617f84cde81a510307b35759028355829796d759eef1b341b14c110f76b13bf04cdecf5ef74b7e9c412b20e8058db33e0a2d0b7dab9ee551b94ed2569e1e7145a11f031b413413388f8de108241dfd3dca3a8150cd96dde1f79ce2cc0ea5c69718d2d4d706fa5467b844366ebe27d26728332cd321905485299172b2d9cfbfcd6811b8"}, &(0x7f0000000100)=0xca) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000140)=0x740) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) 22:39:25 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x5000000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) r3 = getpgrp(0x0) ioprio_set$pid(0x1, r3, 0x2) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r4, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x80400000001, 0x240) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) sendto$inet(r4, &(0x7f0000000100), 0xffffffffffffff1f, 0x0, 0x0, 0x56c3) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000240)={'filter\x00', 0x7, 0x4, 0x498, 0x130, 0x130, 0x270, 0x3b0, 0x3b0, 0x3b0, 0x4, &(0x7f0000000000), {[{{@uncond, 0xf0, 0x130}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@arp={@local, @remote, 0x0, 0x0, @empty, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vlan0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="682b7f619f0e", @empty, @rand_addr, @multicast1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@remote, @dev, @dev}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4e8) close(r4) dup3(r1, r2, 0x0) 22:39:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a60000000000", 0x15) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000010000000000", 0x1c) 22:39:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:25 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x6, 0x111100) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2502000000080001004e24000004000500080002000a00000004000500040005000800030032000000"], 0x38}}, 0x41) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$setregset(0x4205, r4, 0x207, &(0x7f0000000280)={&(0x7f0000000200)="f14231efe757fdcac5aaed466f7b9f14db3fc938b49cd79b915006c62160781b445cd2e2aa008d9f69dfc16f65284cbd7fb5415c15061aad1a0e61a234fac291ffa4be891bd92de094c58411320b2daf8e9f226614cdb7c75a3673da63073b579a69d0cdb33894efe37649fd094f6d2821895514f5b4762f2692", 0x7a}) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:25 executing program 2: r0 = socket(0x13, 0x802, 0x2) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x4) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='trusted@\\system@,bdev\\eth1mime_type!&\x00', 0xffffffffffffff9c}, 0x10) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) write(r0, &(0x7f00009c4000)="220000002100070700be000f090007010a0000c500008000002f0420050013801045", 0x22) 22:39:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a60000000000", 0x15) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:25 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000040)=0x1) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000200)) 22:39:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0xfcc0}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000020000000000", 0x1c) 22:39:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x200005d3}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a60000000000", 0x15) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:26 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x2, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f00000004c0)={0x3f, 0x0, 0xfffffffffffffff9, 0x3, 0xe6d}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x400, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x40000, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000000)="0f20e06635000020000f22e0360fc75b00baf80c66b8beda048e66efbafc0cb000eedcdcba400066ed0f01b20000d9ed660f06d970000fc75c3a", 0x3a}], 0x1, 0x0, &(0x7f0000000080), 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="d368d5b6e525ef2a343a49055210679e463c2bb0a09d43c28cdc362ff431b882941924e77aa8ace9296a73cf8c95ac922215fccaf843c99ce9c5", 0x3a, 0x6}], 0x200000, &(0x7f0000000740)=ANY=[@ANYBLOB="73706163655f63616355653d76322c7373642c87fe636fe57ae12719aca7e3ca909c70cd6d70726573732d66ef7263652c00e281bef6fb77ab205d7544cd9082c090aa8445e716a143808c2c356859a866019ab6957990a5a250497df539306c92ddaac56e1363dd45a7e10031ef1067db654d472925d54400c75b2ae7d24875eba1923784d2f898bb9698"]) ioctl$KVM_RUN(r3, 0xae80, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000280), 0x4) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x400, 0x0) syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x8001, 0x40200) setns(r4, 0x1fffffe) setsockopt$netlink_NETLINK_CAP_ACK(r4, 0x10e, 0xa, &(0x7f0000000240)=0x5, 0x4) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) syz_mount_image$f2fs(&(0x7f0000000500)='f2fs\x00', &(0x7f0000000540)='./file0\x00', 0x4, 0x2, &(0x7f0000000680)=[{&(0x7f0000000580)="0848d6a34402bae6aeeb67a438073820e8463aaa02ab854f8face823868c6215d84d037da0c349c26246344098f95f7db27ec77d41954684a51f41eaf955495c56c0fa0a6127f0252ec96d13ad015e9e6435394017892bdfe2", 0x59, 0x4}, {&(0x7f0000000600)="3c92077e454210e7d610cdfdeb7f5f0f4b52c44d2111a73cd3551b04a5fbbcce405f05f4c884690fe747d439c4ea8e1daa996e1aecc6a0d1e1f46950b84e26905494", 0x42, 0x3}], 0x8000, &(0x7f00000006c0)=ANY=[@ANYBLOB="61636c3a023b2c85727071756f74613d2c6a71666d742276667376312c6673796e635f6d6f64653d706f0e4e782c6469736162654d5f726f6c6c5f666f72776172"]) ioctl$RTC_ALM_READ(r4, 0x80247008, &(0x7f00000002c0)) sendto(r4, &(0x7f0000000340)="1856e1074158262114ea97530a8b2cca4c6c2bf9e064368dd679e7c967d9761e63a52651d2c9137e42a0d62ab31704d2c2cda092aed29fd9bfa80e877792b6d6f1ebf5d84ef65f53a3edb641dafe062ae8f6baddd0d89175e5af331f565a69d311dede9234508da3907491ae8a1d36fb40b55624cc88e9020509d3f38dd7", 0x7e, 0x80, &(0x7f0000000440)=@nfc={0x27, 0x0, 0x100, 0x7}, 0x80) 22:39:26 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x40000) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x7, &(0x7f0000000040)=[{0x1, 0x81, 0x9, 0x1}, {0x7, 0x1, 0xffffffff, 0x4}, {0x2, 0x2dc8, 0x9, 0x1000}, {0x0, 0x81, 0x6b, 0x7f}, {0x7, 0x5, 0x69, 0x9}, {0x0, 0x8, 0x2, 0x6}, {0xff, 0xd9, 0x2, 0x8}]}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000240)) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000020000000000000000", 0x1c) 22:39:26 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000", 0x19) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000001", 0x1c) 22:39:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:26 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) signalfd(r0, &(0x7f0000000000)={0x8}, 0x8) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) [ 1699.350476] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1699.357881] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 1699.366804] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1699.374334] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 1699.382575] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1699.389886] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 1699.399853] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1699.407173] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 22:39:26 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setregset(0x420c, r2, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}) 22:39:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000", 0x19) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000002", 0x1c) 22:39:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x1fcc0}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x7ffff000}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:26 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x1, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x6, 0x14, &(0x7f0000000600)=@raw=[@call={0x85, 0x0, 0x0, 0x45}, @map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x35}, @exit, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x76a1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x5, 0x10}, @call={0x85, 0x0, 0x0, 0x46}, @call={0x85, 0x0, 0x0, 0x25}, @exit], &(0x7f0000000300)='syzkaller\x00', 0x2, 0x37, &(0x7f0000000340)=""/55, 0x41100}, 0x48) syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x7fff, 0xa001) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) ioctl$sock_bt(r0, 0xdd1f, &(0x7f0000000280)="05ef372e4de642529c81e1e03d0c17b027e5a26aa9efa4ee2747d485bdfb3293e586368b636ed4e985908edb54571987515238e4847a0d2c33c6f36ec15b3589675a952c3233bbb92a524ef9") 22:39:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYRESOCT]) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x20000, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x6}}]}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x1002, &(0x7f00000002c0)={[{@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x6}}]}) 22:39:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000", 0x19) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000100000000", 0x1c) 22:39:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:26 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0xf0ffffff00000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:27 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101401, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000040)=0x100000) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a60000000000000000000000", 0x1b) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:27 executing program 2: capset(&(0x7f0000000000)={0x400019980330}, &(0x7f0000000080)) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x80000000, 0x622080) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000180)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x20, 0x0, &(0x7f00000001c0)=[@acquire_done={0x40106309, r1, 0x1}, @dead_binder_done], 0xda, 0x0, &(0x7f0000000200)="a7367a0f955b0e7a6f4ad60778b06d9df2d802da4cab104b4fe60406a0fcfda2bd99c855591670257b62dea5cb4e659e7f860f602f77aea4b5cd9362ce86ac4cf13d22fe141660d49da7751768ec36d3e823e166ebc8642d555cf408a0f72cf848387cfe86fa7dccd04181e87d145f8039de9851e5226be4b8dfbe8293764d384b2456c1babd23dedeeef9971ff41e0b55def212bf0399e5e2b6a926b7c35163dfb4a63c79810d8bafa8b0d3f46427f6ca8e3984b1c17b9a20531b8143de851d0d4425d0dd49e5b53231b52deb83b54526e42f85e49631501828"}) r2 = socket$netlink(0x10, 0x3, 0x8000000004) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r3, 0x5) shutdown(r2, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 22:39:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000200000000", 0x1c) [ 1700.421509] Unknown ioctl 1074310728 22:39:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a60000000000000000000000", 0x1b) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) [ 1700.447574] Unknown ioctl 1074310728 22:39:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000200000000000000", 0x1c) 22:39:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x2fcc0}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0xffffffffffffffff}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x12, 0xf, 0x400, 0x70bd29, 0x25dfdbff, {0xf, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x20008000) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r2, 0x80247009) 22:39:27 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000200)) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000000240)) keyctl$set_timeout(0xf, r3, 0x91) socketpair(0xf, 0x7, 0x1000, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x31) 22:39:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a60000000000000000000000", 0x1b) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000002000000000000", 0x1c) 22:39:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:27 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x10000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x4, &(0x7f00000001c0)=0x0) io_getevents(r1, 0x2, 0x192, &(0x7f0000000040), &(0x7f0000000000)={0x77359400}) r2 = open(&(0x7f0000000040)='\x00', 0x0, 0x14) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000640)}]) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f00000000c0)="b89f37ff9ad7d90363f4c29ff0a84316842e5f75062da117421bda10", 0x1c}]) 22:39:28 executing program 6: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000280)) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x4040) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000200)=0x4) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:28 executing program 6: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f00000002c0)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ramfs\x00', 0x0, &(0x7f0000000340)) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x1, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000580), &(0x7f0000000100)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x54003, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x100000000, 0x137f, 0x1000, 0x7963, 0xee5}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000200)={r2, 0xffffffff, 0x7, 0x175}, &(0x7f0000000240)=0x10) 22:39:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0xfcc0}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x3fcc0}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket$packet(0x11, 0x80000000000000a, 0x300) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x280600, 0x0) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x5d) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x3a, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaa62dc46609b318e14aa00000000000008004600002c0000000000849078ac1414aa800000004404000000000000b5859b4278cef16e93", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5057000090bf0000"], &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$evdev(r2, &(0x7f0000000300)=[{{0x0, 0x2710}, 0x15, 0xd7a}, {{0x77359400}, 0x16, 0x6e, 0x1}, {{0x77359400}, 0x1f, 0x0, 0x5}, {{0x77359400}, 0x0, 0x3, 0x2}, {{r3, r4/1000+10000}, 0x17, 0x1, 0x5}, {{0x77359400}, 0x2, 0xfffffffffffffff7, 0x6}, {{}, 0x12, 0x3097180000000000, 0xfffffffffffffff8}], 0xa8) fcntl$dupfd(r0, 0x0, r1) 22:39:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000001000000", 0x1c) 22:39:28 executing program 6: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000000)) mknod(&(0x7f0000000100)='./file0\x00', 0x103f, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000080)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='stack\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000002740)=""/85, 0x55}], 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x4000, 0x0) recvfrom(r0, &(0x7f0000000080)=""/116, 0x74, 0x2000, 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) execve(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f00000000c0), &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x27e, 0x0) socket$pppoe(0x18, 0x1, 0x0) 22:39:28 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1000000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000002000000", 0x1c) 22:39:29 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt(r0, 0x114, 0x2720, &(0x7f0000000100)=""/13, &(0x7f000033bffc)=0xd) 22:39:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000010000", 0x1c) 22:39:29 executing program 6: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x105100, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f00000000c0)={0x0, 0x1}) recvfrom$unix(r0, &(0x7f00000003c0)=""/222, 0xfffffffffffffee3, 0x0, 0x0, 0x0) shutdown(r1, 0x2) 22:39:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x1fcc0}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:29 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80, 0x48) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000180)={@mcast1, r1}, 0x14) r2 = socket$inet(0x15, 0x400000080005, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet(r2, &(0x7f000001a000)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1c, &(0x7f0000000300)=""/220, &(0x7f0000000140)=0x2) 22:39:29 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f0000000ffc), &(0x7f0000012000)=0x4) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) close(r1) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000040)=0x2) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000140)={r3, 0x7}, &(0x7f0000000180)=0x372) ioctl$fiemap(r1, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="0600000000000000ffffff7f000000000700000000020000030000000000000000000100000000004000000000000000010400000000000000000000000000000000000000000000002000000000000000000000000000000200000000000000ff03000000000000070000000000000000000000000000000000000000000000050000000000000000000000000000006d00000000008003e70000cbf785270080000000000000000000000000000000000000000000000001100000000000000000000000000000"]) 22:39:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000020000", 0x1c) 22:39:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x400006a4}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:29 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x100000000000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:29 executing program 6: getrandom(&(0x7f0000000140)=""/102, 0x66, 0x1) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="f1dcc4bee8a54cf4bcfdc159b17a821fcca5b5cbef933726c9cf1f3010e7e5e692f54da07d338a898b5ccf6c25d2dd1d35907df4e633d9e4e35688e310ff4a4c59bb9d789f13b6b2fe7219a39acc474273652ce805fbb4d749df5b723333db73b3d55ea84628bef17a7a2447877829cc579640d5ea9867fdbd4aa78674ff1b", 0x7f, 0x0, &(0x7f0000000240)={0xa, 0x4e24, 0x1, @remote, 0xffffffff80000000}, 0x1c) r1 = socket$inet6(0xa, 0x800000806, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000000)="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", 0x118) 22:39:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000020000000000", 0x1c) 22:39:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x19, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) getpeername(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000080)=0x80) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) 22:39:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x2fcc0}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:30 executing program 6: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000200)=0x3, 0x4) 22:39:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x10, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:30 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000100)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) write(r1, &(0x7f0000000080)="a85883156f79", 0x6) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) sendfile(r1, r1, &(0x7f0000317000), 0xff8) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240), 0x0, 0x0, &(0x7f00000002c0)}) setsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000180)="ecd97312cacde214a8d04446db6388efec68c858a95cf747fa23b2761e886816cab17e91f9fc11b6f1866e7156448f2ebca59a9ae84cef9189a88093bd4ca8a8ddf92f7e9a24059d6ff70b56086368440cd845675924716f79ddc469b933473f774fdb1b777f4ef279d03942fe0ab83097654185c3f8f66208ee65bd85aec1a81140f1eb323fae0b08874b5eb1601df9da7c271c089c2c20cff77efbcce5d6067394e2281da073861e6b25ebddf8", 0xae) 22:39:30 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x3000000, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000200000000", 0x1c) 22:39:30 executing program 2: r0 = add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000400)="16", 0x1, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f00000000c0)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) keyctl$setperm(0x11, r0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xa76, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000080)={0x18, 0xf, 0x2, {{0x4, 0x3, 0x3}, 0xafc}}, 0x18) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000001c0), 0x4) write$P9_RREADDIR(r1, &(0x7f0000000200)={0x68, 0x29, 0x2, {0x2, [{{0x20, 0x1}, 0x2c538b7a, 0x6, 0x7, './file0'}, {{0x0, 0x1, 0x2}, 0x3, 0x0, 0x7, './file0'}, {{0x0, 0x3, 0x4}, 0x7, 0x7, 0x7, './file0'}]}}, 0x68) [ 1704.126849] binder: 21748:21758 ioctl c0306201 20000340 returned -14 [ 1704.138814] binder: 21748:21762 ioctl c0306201 20000340 returned -14 22:39:30 executing program 6: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'teql0\x00', 0x102}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000240)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80000, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000000c0)=0x2, &(0x7f0000000100)=0x1) 22:39:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x3fcc0}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4800, 0x0) ioctl$VT_ACTIVATE(r1, 0x5606, 0x100000000) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) setsockopt(r0, 0x100000001, 0x7, &(0x7f0000000140)="3795e48f", 0x4) 22:39:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',dIfault_permissions,\x00']) 22:39:31 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x8, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85714070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000040)=@hopopts={0x4, 0x5, [], [@calipso={0x7, 0x20, {0x8001, 0x6, 0x1, 0xfffffffffffffffc, [0xfffffffffffffffb, 0x3, 0x93]}}, @jumbo={0xc2, 0x4, 0x800}]}, 0x30) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=@routing, 0x8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 22:39:31 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x5c5, 0x4, &(0x7f0000000340)=[{&(0x7f00000000c0)="61c8393db7816c17f81793ad7154cf4a7398a4291c55c3098f19d4", 0x1b, 0x6f89}, {&(0x7f0000000140)="865664d5165dd87be7a5d9a7f5ae1b6e38fc11ed16e9ee8d270c95b037a1d19bcc4cc4f0512ae2b5eaf09481992e75386e4722edc968d39a3508fec77e3948a9fdeb85fa086ddd59bb8af17a69d9d3e00cfcafc0f58f3674e309b149ff50823bbeca11f1f912d44bc1b4e684ea791c2f52733e4a0f5c663046ceec3a2337b3e58ec96473c8c488", 0x87, 0x2}, {&(0x7f0000000200)="eae8ae9ff595c9bc79f5109562c4bc73fc34c2102e058b7164d914579c650f5cf88e7a5e411d3069a90b168ee841d9ae1c9f08d34c20b031fc20cc6a55b4683535213df3d11c419e7f69bd97c8fe114e5f597dbebca6e2ec8ce878eb5e8b85034b9c82602e676f51a2ea731e8514260dd9aee323eee5adf79b25fcc7f68c09ec68c8a2e9f42902a6637871cbcc2619e8f160f90c9f9d2f468fe2", 0x9a, 0x101}, {&(0x7f00000002c0)="36544b3da0b50f138802dfac9242f3e0f0ba8e14c8a2955766d25bd1cee7af492f8ee37e7a47a9ea10e445154e49d6ffa6bd2a32403ee976694ec7ec07d2e36181850b23cd8f72b1e80174b3599d8e13e976", 0x52, 0x6}], 0x4000, &(0x7f00000003c0)={[{@quota_off='quota=off'}, {@lockproto_dlm='lockproto=dlm'}, {@lockproto_nolock='lockproto=lock_nolock'}, {@discard='discard'}, {@hostdata={'hostdata', 0x3d, 'bdev'}}, {@noquota='noquota'}, {@noquota='noquota'}]}) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000bf6000)=0x177, 0x4) sendto$inet6(r1, &(0x7f0000e13f4e), 0x0, 0x0, &(0x7f000020d000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000000)=0xc686, 0x4) recvmmsg(r1, &(0x7f0000f61000)=[{{&(0x7f0000f62ff0)=@ipx, 0x10, &(0x7f0000f5d000), 0x0, &(0x7f0000f62000)=""/89, 0x59}}], 0x61, 0x2041, 0x0) 22:39:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000100", 0x1c) 22:39:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:32 executing program 2: r0 = request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000080)='logon\x00', 0x0) keyctl$restrict_keyring(0x1d, r0, &(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)='{^systemtrustedeth0@:\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) request_key(&(0x7f0000e0f000)='logon\x00', &(0x7f0000ab3ffb), &(0x7f0000000380)='\x00', 0x0) [ 1705.361023] attempt to access beyond end of device [ 1705.366087] loop6: rw=4096, want=136, limit=111 [ 1705.370824] gfs2: error 10 reading superblock [ 1705.438992] attempt to access beyond end of device [ 1705.444135] loop6: rw=4096, want=136, limit=111 [ 1705.448943] gfs2: error 10 reading superblock 22:39:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x400006a4}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000200", 0x1c) 22:39:32 executing program 6: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x3, &(0x7f00000000c0)) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0x7, 0x4b, 0x2}, 0x7) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) 22:39:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:32 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0xfffffffffffffffb, 0x0) r1 = dup(r0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x2000) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000380)={0x2, 0x0, [0x486]}) 22:39:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x34, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x10a) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xffffffff, 0x4) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400add427323b470c458c560a067fffffff81004e220000000058000b4824ca945f6400940005002825fda48c00000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 22:39:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000002000000", 0x1c) 22:39:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:32 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0//ile0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000580)=0x1000008, 0x4) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = request_key(&(0x7f00000005c0)='.dead\x00', &(0x7f0000000600)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000640)="717565756531000000000000001f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000", 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) r3 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/28, 0xf6d48c2e) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f00000003c0)={0xbf}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0xfffffffffffffffd, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000340)=0xc) getpgrp(r5) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000006c0)) get_thread_area(&(0x7f0000000680)={0x8, 0xffffffffffffffff, 0x4000, 0x3, 0x7, 0x81, 0x0, 0x5, 0x5, 0x3}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000440)={@loopback, 0x0, 0x1, 0x1, 0x2, 0x1000, 0x1, 0x4}, &(0x7f0000000540)=0x20) rmdir(&(0x7f0000000700)='./file0//ile0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc05c5340, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"}) r6 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x9}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r6, 0x1000000000013) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000001c0)={0x27, 0x20, 0x12, 0x18, 0x8, 0x8, 0x6, 0x6, 0xffffffffffffffff}) 22:39:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:33 executing program 2: r0 = inotify_init1(0xfffffffffffffffe) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) splice(r0, &(0x7f0000000240), r0, &(0x7f0000000280), 0xfffffffffffffff8, 0xe) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000140)={0x0, r1+30000000}, &(0x7f0000000180), 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x90100) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000001c0)=""/77, &(0x7f0000000080)=0x4d) 22:39:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x7fffefad}], 0x2, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000200005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6a71d317c6abbe293a5b66c76b2c3203c167342e220000000000004de7cdf25689c4127f24b8a950e9af91030bca682efc4aa2f71f6ffb3c071e73a813099dc20e2ef829e4f279b3d0ce5f280471efad2a57665a005144a4577159151ecbf0776d4e777ab1ac3689d6e2a287121d9280c5cd2b00bcf3164e90650000000000000000"]) ioctl(r0, 0x101, &(0x7f0000000040)="4556797bb24ac4f466918fa61cd4d9eb07a28bc47ef3cd4e79239346d0262e6aecca1ff06186d9cb3ef027efc10753e11a9716cd4ef51620aeed16ad93f0ce2fef989b4db3acf2f2c577478fa5d0fa26c526ccea44db0209db94f71fd69fed6c72611fe5503324997115c9c292812e699ac2d9e39a20c4aff560f85090f09edcd6d5fb5d5e51d740fe5ed70c489a5e2ef7fde7fcdad3780bebb1850bfa2a7b852838406803811045") 22:39:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1c3) setresuid(r2, 0x0, 0x0) bind$unix(r1, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100), &(0x7f0000000040)='/dev/admmidi#\x00', 0xfffffffffffffffb) getcwd(&(0x7f00000001c0)=""/27, 0x1b) 22:39:33 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x7000000}, 0x0) 22:39:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) [ 1707.103157] REISERFS warning (device loop6): super-6502 reiserfs_getopt: unknown mount option "jqƫ):[fk" 22:39:33 executing program 2: readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/156, 0x9c}, {&(0x7f0000000480)=""/147, 0x93}, {&(0x7f0000000300)=""/165, 0x6}], 0x3) r0 = socket$inet6(0xa, 0x3, 0x1) r1 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x9, 0x20000000000042) r2 = mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000006, 0x2033, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)={r2}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x88d9, @loopback}, 0x1c) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000003, 0x11, r0, 0x0) clock_settime(0x0, &(0x7f0000000100)={0x0, 0x1c9c380}) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c00a2aaaab4801edb7900000000000000"], 0xc}}], 0xb, 0x0) [ 1707.170670] REISERFS warning (device loop6): super-6502 reiserfs_getopt: unknown mount option "jqƫ):[fk" 22:39:34 executing program 6: ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000140)={@my}) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0x0, @my}, 0x10) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x1000000004e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) socket$can_raw(0x1d, 0x3, 0x1) listen(r2, 0x800400000000ff) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp6\x00') ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x6) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f00000000c0), &(0x7f0000000100)=0x4) close(r0) 22:39:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000002", 0x1c) 22:39:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x8, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xf3) r1 = memfd_create(&(0x7f0000000040)='p[em0\x00', 0x3) dup2(r1, r0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000380)={0x0, 0x5, 0x8}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r2, 0xc39d, 0x3, [0x4, 0xffffffffffffffff, 0x1000]}, &(0x7f0000000100)=0xe) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0xe3, "4b458f81467d8100802fb229093879a4c034ed4c9b92d6f9430dacb1bf10a07f9b9b631ca5ae9b173228740dd939c85e65ec8f6526262d48256f42e83cd784603ba9f23ebb84fe2cdd00df7beadb16d6ac6cd2ae5c87ff16f19a405f7b45a6a233f01e1bc09ccc2b2ba1cb05ec0881d23b516a47b14894e0715d6ec7480787745f117bb58d599d1a98cd997d4f312decae287f7f214243339e8edb90ebd2f0c9f74d6cdfa4262faa092defcccae991d7a183e90d09b612b840bf6917852cb0c91e3525b85b02d275eb3040f6a054c2259e33e4d93a61f2d3dd816943110ac2185905f2"}, &(0x7f0000000240)=0xeb) eventfd(0xbc) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000280)={r3, 0x0, 0x80000000, 0x4, 0x5c8, 0x7, 0x95d8, 0x6, {r4, @in6={{0xa, 0x4e22, 0x4, @remote, 0x1}}, 0x9, 0x80000000, 0x0, 0x1, 0x1ff}}, &(0x7f0000000340)=0xb0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) 22:39:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000001", 0x1c) 22:39:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:34 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RREADDIR(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000afe6bdbed0770cf084fe43b7cf984c3e0000a73d11108f872400"], 0x2a) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r2, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RGETATTR(r2, &(0x7f00000003c0)={0xa0, 0x19, 0x1}, 0xa0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000640)={0xb, 0x29, 0x1}, 0xb) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_uid={'access'}}]}}) r3 = open$dir(&(0x7f00000013c0)='./file0\x00', 0x0, 0x0) fdatasync(r3) 22:39:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x100000}, 0x0) 22:39:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000020000", 0x1c) 22:39:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e6f3da72d39e3b8e72a99369440a934ff1320ffa0e87fe154ad71c78ac573b77f5479978b7edcac497bb995eb721c0b421723335176fa597ba6", @ANYRESHEX=r2, @ANYBLOB=',\x00']) write$P9_RREADDIR(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="2a0000002901000000000000000000000000000000000000fe000000bc4f00000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@loose='loose'}]}}) 22:39:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:35 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(tnepres))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000c18000), 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000040)=0x2, 0x4) 22:39:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) [ 1708.533815] 9pnet: Insufficient options for proto=fd [ 1708.546509] 9pnet: Insufficient options for proto=fd 22:39:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x34, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:35 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000), 0xc, &(0x7f00005a6ff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="380100001000130700000000000000000000000000fe0000000000001d0000000000000000000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="7f0000010000000000000000000000000000000032000000000000000000000000000000000000010000000000000000000000000000000000110000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480003006465666c617465000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003697b4abdc34978099594e5985932bd9e664e2c0e0105498"], 0x138}}, 0x0) 22:39:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:35 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @loopback}}, 0x2, 0x2, 0xebf8, 0x5, 0xfd}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000001c0)={r2, 0x3c60}, 0x8) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$TCSBRK(r0, 0x5409, 0x1f) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000200)=0x68) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000fddfff)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x4}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000002c0)=0x3, 0x4) r3 = syz_open_pts(r0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) select(0x40, &(0x7f0000000440)={0x3, 0x9, 0x58ac, 0x6, 0xb7, 0x40, 0x7ff, 0x9}, &(0x7f0000000480)={0xe212, 0xe840, 0x80000000, 0x1, 0x8001, 0xfffffffffffffffa, 0x3, 0x2}, &(0x7f0000000500)={0x20, 0x3f, 0x0, 0x7ff, 0x80, 0x1, 0x401, 0x8}, &(0x7f0000000540)={0x0, 0x7530}) statfs(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=""/132) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r4, 0xc0505405, &(0x7f0000000240)={{0xffffffffffffffff, 0x3, 0x6, 0x3, 0x5}, 0x81, 0x9}) ioctl$TIOCSETD(r3, 0x5412, &(0x7f00000005c0)=0x1) [ 1709.003665] Unknown ioctl -1068477435 [ 1709.024117] Unknown ioctl -1068477435 22:39:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x300}, 0x0) 22:39:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:35 executing program 6: r0 = socket$kcm(0x11, 0x2, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='\x00'}, 0x10) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=0x33) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x330}, 0x0) r2 = msgget(0x3, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000000200)=0xe8) r4 = getgid() r5 = geteuid() fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000500)=0x0) r8 = getpgrp(0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000540)={{0x80000001, r3, r4, r5, r6, 0x0, 0x9}, 0x3, 0x7, 0x9, 0x80, 0x902d, 0x9, r7, r8}) r9 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2040, 0x40) write$UHID_DESTROY(r9, &(0x7f0000000140), 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc={0x27, 0x8}, 0xb6, &(0x7f0000000100)}, 0x0) 22:39:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGETD(r1, 0x2, &(0x7f0000000000)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x3, 0x2, 0x3, 0x9, 0x0, 0x6, 0x6}, 0x20) 22:39:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x10, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:36 executing program 2: r0 = getpgid(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='gid_map\x00') r2 = socket$inet_sctp(0x2, 0x1, 0x84) writev(r1, &(0x7f00000011c0)=[{&(0x7f0000001140)='\b', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x9, 0x10000}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000000c0)=r3, 0x4) 22:39:36 executing program 6: r0 = socket$inet6(0xa, 0x80000, 0x4000000000000003) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") preadv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/108, 0x6c}, {&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000580)=""/250, 0xfa}], 0x3, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) getsockopt$inet6_tcp_int(r0, 0x6, 0x33, &(0x7f0000000100), &(0x7f0000000280)=0x4) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000380)=0x2, 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYBLOB="b5000000ee0cd74c227ff3f7885ba14d17b5ff4f4f0aedef73a3991a56623dd3943db5a7e72c946911404ddc2bb351d3295791157b015680cbeb8b1c4dd4f5c460e14a60d944c84694c4de1f3c392c6b4d1b050338f11cc40000000003be9246e3b9bf74358ed3d67b8024882a1567a764b6bc87ced81043d123be95788afb5c127d6d54a7c9d50200000090b2b5871c94d565f74d708e8bc24661f78342e0215993e5396a4d10d05064283685240c4dd0dd"], &(0x7f0000000140)=0x1) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000200)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x0, {0x2, 0x0, @loopback}, 'bond_slave_0\x00'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f00000000c0)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r4, 0x8008ae9d, &(0x7f0000000680)=""/4096) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x14, 0x0, 0x0, @empty, "000000081e84d84b2db57b8a0af02ad8c4fda114"}}}}}, &(0x7f0000000080)={0x0, 0x10000, [0x0, 0xfffffffffffffffc]}) 22:39:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000200", 0x1c) 22:39:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:36 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x700}, 0x0) 22:39:36 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400, 0x0) write$FUSE_POLL(r0, &(0x7f0000000040)={0x18, 0x0, 0x6, {0x9}}, 0x18) syz_mount_image$xfs(&(0x7f00000001c0)='xfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)={[{@noquota='noquota'}, {@logdev={'logdev', 0x3d, './bus'}}]}) 22:39:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) [ 1710.233487] XFS (loop2): Invalid device [./bus], error=-15 [ 1710.269214] XFS (loop2): Invalid device [./bus], error=-15 22:39:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:37 executing program 2: r0 = socket(0x10, 0x2, 0xc) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400400, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000080)={0x1, 0x7d0, 0x0, 0x1}) write(r0, &(0x7f0000000000)="1f0000000104fffffd3b000007110000f30501000b000100020423ca0000cf", 0x1f) 22:39:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x300}, 0x0) 22:39:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:37 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:37 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000087) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000000000)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f00000001c0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 22:39:37 executing program 2: r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000040)={0x402e, 0xe2, 0x5, 0x500}) openat(r2, &(0x7f0000000000)='./file0\x00', 0x210080, 0x100) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000180)={0x9, 0xa7e, 0x2}) 22:39:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x3}, 0x0) 22:39:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:37 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) r1 = add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000001c0)="e8dc3a5d8dbe3c434a70a793a474c33a87a9213c453bb5ef5f6e8cfe002a062c9912a8ca4fcd093c5e320a8561718300db1d3a86a153b85f1a588e5162312f606dcd991920ed70b21a97f01bede7", 0x4e, 0x0) keyctl$set_timeout(0xf, r1, 0xe631) bind$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x2711}, 0x10) 22:39:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000002", 0x1c) 22:39:37 executing program 2: r0 = msgget$private(0x0, 0x10) msgrcv(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000"], 0x1, 0x9, 0xa4a3ad41a879ddec) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x109100) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000080)={'veth1_to_team\x00', 0x600}) r2 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@broadcast, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) 22:39:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x3}, 0x0) 22:39:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002b40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000003ac0)={&(0x7f0000000040), 0xc, &(0x7f0000003a80)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6018009e", @ANYRES16, @ANYBLOB="250200000000000000000100000008000100", @ANYRES32=r1, @ANYBLOB="4400020004000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e636500"], 0x60}}, 0x0) 22:39:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:38 executing program 6: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b660800666174000204010a0200027400f8000000565a3fd3b7d778eeb6597cb8f60dd00900028322", 0x2d}], 0x0, &(0x7f0000000140)={[{@dots='dots'}, {@nodots='nodots'}, {@fat=@showexec='showexec'}, {@fat=@uid={'uid'}}]}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x1000, 0xa, &(0x7f0000000780)=[{&(0x7f00000000c0), 0x0, 0x78b3}, {&(0x7f0000000240)="8e469dbd898e3bb85992bfe65fc2990eff1c51249749476235bbf0f9df28104dd1ff1294e8d5274f3017f4d82522cac2a4bfed613265702245370fd10871fa3cbf4813165be7a3992e5d9de92ef19075e54179528b2488607dddc4a846aca2f70c3b67c3f8a3a97325c8065b7b31e93cfe6e008dbd9f3755f63ec062051506b64377012a191195b00086a5eb813218bc64f7e7d7647365a8d26c222695d9e267dafc7a27dbf649cdb75779a5462e7930af73f94fe7c994b766add24e6d701565031420fb1629aef9cd5bc1c9b7c23895f2471218d8723a208e0d2b268500d72407d5e3cf5f37ba", 0xe7, 0x5}, {&(0x7f0000000440)="1f2f6e397384b338e42fb1293ca4da9a9ab4a25b2dada550ddaef52807c209a657492c7d0e1f711467d6b3a70087f2d6cbb7f7f1e5720d024a2926ce4003caf1217de08bb9015d92e8a6d825152672e06b5d6a3ec2768773791424107c64eab41ac29697e5a3652b93f45ad47cd015b32276833dd67bf23eb1feff38e735d30a13d05459620e1146373470fa", 0x8c, 0x1ff}, {&(0x7f0000000100)="390f9618d37fb0b30ec5", 0xa, 0x5}, {&(0x7f0000000500)="31f718b34cd9aaa292545e70fc197645906fb20ea5313c47c877ad21f6f87a2365578429374c2d905229564abe8f09a9df13e2f3d121ffe713978f065eb5b97afc61c37c25dc0b3da5bb22a3b5eb2e1fe3e343588f85258d9ce56d844fe2f85af9804d75244e6a4c922e09c336b351104a70a7e63061ad9932b4902eafe6858596f4568851197d30405fe95df8942b60acf24ca9e2b216870467d90bbf856c2cc4646b99013690ae159fcd931f6a08487e4cdedc276910e24952ba83128b7e6d9da10e30d957893de3644057920250dc35a32cf4664c4eec94632fd84c31769f8ffb123c851333bb29e115fc1a", 0xed, 0x6}, {&(0x7f0000000180), 0x0, 0xff}, {&(0x7f00000001c0)="730559d3fff89b42fb89f6c4e7", 0xd, 0x25}, {&(0x7f0000000600)="014852ff57e50708407b824f0171ffb7bfe3fbd69705ae1a0b70be5ac3ee05b68a294f27d3aa71f596ada48733fb8d78aa6dd0812b27183da7769da50d14f8307c277bd411d5dd91e2913d55bb71502606bb48b7bd375892afc27b4766b6bdf5d5205c44bef106c1c53874373c6663c50a9957717be7c85b6c8022004314ea99a5910b7f374be7d8f10a16ab958d877372c4cbbfe3024023b32becd9e3e38d", 0x9f, 0x9}, {&(0x7f0000000340)="4f537bc5312cecc28da47ccc3185c20bd9934d8724ed5437b4e7ab1a42f2ebdfce7f91ffed0a98a0bf805ffba6b793ca1af44e748639fb8f44225b129dfd5d65ace273bef4d23779fbed5b55c989df8c46ad7a", 0x53, 0x101}, {&(0x7f00000006c0)="767f0ebb0fad06414cad94e85677543c426773e6f3b1b984d8562ea4c684afd532b121add4963e9550de7ad12a184767c49b70875c43a563dde7e73bb67305c7884086a401dbda2602ca5c1e3c64022a2894dbc7aebc786fe54002396f31b7e195b8c9ede8fa7f200a5de4713fe1d9234c594a9390ec8158eb1b8333c6461042d8ec8d29937bcfdcf3fc8780b5fd8fe7fb690e305c", 0x95, 0xfe11}], 0x1000000, &(0x7f0000000880)={[{@dots='dots'}, {@fat=@tz_utc='tz=UTC'}, {@nodots='nodots'}, {@dots='dots'}, {@dots='dots'}, {@dots='dots'}]}) [ 1712.045209] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1712.073909] FAT-fs (loop6): FAT read failed (blocknr 2561) 22:39:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x7}, 0x0) 22:39:38 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x202000000802, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000580)=0x1, 0xff0e) fcntl$setlease(0xffffffffffffffff, 0x400, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f000088c000)={@remote, 0x0, 0x0, 0x2, 0x80000000000041}, 0x20) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) accept$unix(r1, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x1000000800, 0x0, 0x3, 0x1}, 0x20) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f0000000100)=ANY=[]) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) socket$inet6(0xa, 0x80006, 0x2) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x280, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000440)='tunl0\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x1, 0x14, 0xcc, 0xcfec, 0x2}, &(0x7f0000000540)=0x98) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x13, 0x402100) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') sendfile(r0, r4, &(0x7f0000000340)=0x4b, 0x7ffffffe) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=r3, 0x4) 22:39:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:38 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0x80045300, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) bind$unix(r1, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x1fc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x64}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000280)={r2, 0x6}, &(0x7f00000002c0)=0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) [ 1712.107484] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1712.116334] FAT-fs (loop6): FAT read failed (blocknr 2561) 22:39:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000bc11b775c491d89ebb8190c9acf5b2b2a81f1d600a03e8d469a49a77ff0f0601217ac560cbb64d7ad458ad2a8d48cf6fc62beb13d87cd1d7b5de5e73e2042800000000000000000000000000000000000000000000000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) [ 1712.319850] QAT: Invalid ioctl [ 1712.335811] QAT: Invalid ioctl 22:39:39 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x84000, 0x0) ioctl$TIOCCBRK(r2, 0x5428) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4188aea7, &(0x7f00000001c0)={0x2, 0x0, [{0x80000008}, {0x1}]}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x8000, 0x5, &(0x7f0000000380)=[{&(0x7f00000005c0)="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", 0x1000, 0x9}, {&(0x7f0000000080)="76261abefecf86dea0310479dd5ac3f24b5a47640e9ea2c0f4a25bd04643d53254e259a73fb3555e7ef9ba0c4307c2766a9988dbe8bd25a4603aed5e2767c0e18643f98aac90cd86a15fee981a5a35945bd9dbd7c0d78654628b85212a9a372a4e32a4490c2f04569ef12fe50f0f6be431c87af3929738053fab2f4f63b4de3166ece6c19c55b2cb954dc95e4de00b90ca9f414b5fa0d6e8d9", 0x99, 0x4}, {&(0x7f0000000140)="3ea89f3629042604c856d295d95479a4bd459109a4395ab2969aa003e97b1b4b9213d61f9b88c6586b1c890cda2fc6ab4f70f2661c7932955f40423d3f522ae20f8817663c451d182589b4e5ca752289ab", 0x51, 0x2}, {&(0x7f0000000200)="498a680be53e7a8583606f57adbe659daba6ebb62feeb23f1625c42dcb54d7418a1e9deecca4f6b062d161edbad6d9e88a43af11118f4b873ae991b364e0aced779ff13c267810be7182c46fbc6b9521e89fecd524d0901a8536c8dc8b9e978dc4b6fcbe8b9889babf0fcfa060b5", 0x6e, 0x8}, {&(0x7f0000000280)="4680e08aec57c990e33b155645425834f590ad94b49d8cfc8eb15d90f1703f8d04d9cfca04480accc5080722d0d0e2b721d23f586e87763117cca1c7a8556b7653eae501581bf0d8ac6040d0c618403fec4f4905cbbc536d0f55332a9668119af1cb75b61fd7002dd2059af2b3f7aa2ac266579ebba7995a60dc04cf1e15f6dfefea78b4440890c42a4fec72caf00fbde3bb9dd3e06ef20f546335f68135cfe03edee0e0d1e1bc937bac74ef6270bc785326a9dc77e780153251e93bf1a98af5b14eb7db9c9691c246", 0xc9, 0x7ff}], 0x82, &(0x7f0000000400)={[{@nodatacow='nodatacow'}]}) 22:39:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:39 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xfa, 0x644000) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f00000000c0)={@local, @multicast2, @multicast1}, &(0x7f0000000100)=0xc) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x9) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) eventfd2(0x40, 0x80801) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) listen(r3, 0x0) 22:39:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x7}, 0x0) 22:39:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x2000000}, 0x0) 22:39:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x200001dc) 22:39:39 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f00009dffb8)=ANY=[@ANYBLOB="18000100000000000100000001000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bind$unix(r2, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e22}, 0x6e) sendmsg$unix(r2, &(0x7f0000e4ffc8)={&(0x7f0000beb000)=@abs, 0x8, &(0x7f000000d000), 0x0, &(0x7f000053c000)=[@rights={0x18, 0x1, 0x1, [r2]}], 0x18}, 0x0) close(r2) close(r0) 22:39:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ptrace$getenv(0x4201, r1, 0x7ff, &(0x7f0000000040)) ppoll(&(0x7f0000000200)=[{r0, 0xffc99a3b}], 0x1, &(0x7f0000000240)={0x77359400}, &(0x7f0000000280), 0x8) 22:39:39 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:39 executing program 6: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'veth0_to_bridge\x00', 0x0}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000480)=@setlink={0x34, 0x13, 0x32b, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x14, 0x16, [{0x10, 0x1, [@nested={0xc, 0x9, [@generic="b21aa0212d"]}]}]}]}, 0x34}}, 0x0) 22:39:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x5000) 22:39:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x300000000000000}, 0x0) 22:39:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000400)={0x10, 0x300000000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000040)=ANY=[@ANYBLOB="300080002000010000000000000000000800000008000300000000aa08000200ac1414bb000000000000000000000000"], 0x30}}, 0x0) 22:39:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x3) 22:39:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x200000000000, 0x56, @loopback, 0xfff}, 0x26b) r2 = msgget(0x2, 0x28) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000000)) sendmmsg(r1, &(0x7f00000002c0), 0x0, 0x8000) 22:39:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x15c) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d9b6", 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x800) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x9f, "e9c0556ffe0a1f8df9ce31f6d050fa0de79377aa8e12ea0f2a94eec828ebc225bcdaad90fef95da403c688d7c13cf77315676564ed53a7def34a13dd9f67c779b88254e4f913e4f451309cb67dce93a4b5a37ae58dd51c01943f7768876c9cb4c03501dc40591c44e47bca7214ffe3a33d97260a0e99f7efb5078312c2e521c86f057550ff8e25f5b52096d97a090d9610c403e16c5f3419310336868c8439"}, &(0x7f0000000100)=0xa7) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e24, 0xf5e1, @mcast1, 0xe0}}, 0x4, 0xfffffffffffffffb, 0xe73b, 0x2617}, 0x98) 22:39:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x300000000000000}, 0x0) 22:39:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:40 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x0, 0x0) fchmodat(r1, &(0x7f00000000c0)='./file0/file0\x00', 0x62) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000008000), 0x139f) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x10165) write$FUSE_OPEN(r0, &(0x7f0000000640)={0x20, 0x0, 0x3}, 0x20) 22:39:40 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x3d, &(0x7f0000000100), 0x4) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x5d0, 0x0, 0x101, 0x7fffffff}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r2, 0x1f}, 0x8) openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x4b0100, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000040)={0x3}) r3 = getpgid(0x0) write$FUSE_LK(r0, &(0x7f0000000180)={0x28, 0x0, 0x4, {{0xfff, 0x5, 0x3, r3}}}, 0x28) 22:39:40 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140), 0x8) r2 = accept(r0, &(0x7f0000000380)=@can, &(0x7f0000000000)=0x80) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x8200, 0x6c6c8f66, 0x7fff, 0x0}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000280)={0x100000001, 0xe00000, 0x2, 0x8, 0x7f, 0x10000, 0x100000000, 0x0, r3}, &(0x7f00000002c0)=0x20) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000680)) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000200)) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 22:39:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:40 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000440)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x5, 0x30}, &(0x7f00000001c0)=0xc) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000004c0)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r2, 0x80000000}, &(0x7f00000002c0)=0x916467db129f342d) r4 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000300)={r2, 0x467}, &(0x7f0000000340)=0x8) getsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000380), 0x10) bind$alg(r4, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) r5 = openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x404800, 0x0) r6 = memfd_create(&(0x7f0000000080)='aead\x00', 0x1) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000540)={r3, 0x3}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x7, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000000c0)=r6) getsockopt$inet_sctp6_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x82, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000000)="d98c5b2cb8614fcff9bfb70019b73f93a60000000000007b00000000", 0x35c) 22:39:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x200000000000000}, 0x0) 22:39:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0x4040) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000040)={0x5, 0x0, {0xffffffffffffffff, 0x3, 0x70, 0x0, 0x4}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000004c0)="04", 0x1}], 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r2 = dup3(r0, r0, 0x80000) write(r0, &(0x7f0000000240)="2300000014000707030f00c0f635c63f280f550b00120f0a0811000100f5fe0012ff00", 0x23) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x110, r2, 0x80000000) 22:39:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) fstat(r0, &(0x7f0000000100)) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='\x00'}, 0x10) write$P9_RFSYNC(r1, &(0x7f00000000c0)={0x7, 0x33, 0x2000000}, 0xfffffd32) 22:39:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x700000000000000}, 0x0) 22:39:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:41 executing program 2: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x180080, &(0x7f00000001c0)={[{@uid={'uid'}}]}) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x0, &(0x7f00000001c0)) 22:39:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="a5c12b1623178fde4ad525efd6c7bcc15543711ab733c93ccad32526b5872dfe804d395f5f1405cf76b4a8faf1aa09d0de9b731af21daa9f54f8b3ee28834c3e6c1a54963629ab98142877a2f3ceb0c97ea5a804d5e932f68fdee5f678d8f021865c40259938a358bc96734ae583f1e52198418416d7f52a65c9f5a7a466f1eb3a4a1300134c80c664a4643d47d884028b244f205319a9b6ae3f742a4bc468232806218cf7868ca26b8144c8a9f3386d20a5d30ca9300b08fbdbb97ba4b183d2a972809f49058bc064de5ebb88776741c0ccd01a49953a0e", 0xd8) 22:39:41 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:41 executing program 6: r0 = inotify_init() fdatasync(r0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000140), &(0x7f00000000c0)=0x8) close(r3) close(r2) 22:39:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:41 executing program 2: socket$inet_sctp(0x2, 0x5, 0x84) [ 1715.219041] autofs4:pid:22501:autofs_fill_super: called with bogus options 22:39:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x3000000}, 0x0) 22:39:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={0x2}, &(0x7f0000000040), 0x8) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000000c0)=0x81) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-des3_ede-asm\x00'}, 0xfffffffffffffd94) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:42 executing program 2: socket(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0xf50c}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x20, 0x27, 0x3, 0x0, 0x0, {0xb}, [@typed={0xc, 0x5, @u64}]}, 0x20}}, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'syzkaller0\x00', {0x2, 0x4e23, @multicast1}}) 22:39:42 executing program 6: r0 = socket(0x10000000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x4e20, @loopback}, {0x306}, 0x0, {0x2, 0x4e20, @multicast1}, 'ip_vti0\x00'}) write(r0, &(0x7f0000f56fdc)="240000002e001f811f101a00000000002300f9ffffffffffffffffff08ffffff04010061", 0x24) [ 1715.689181] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 1715.744640] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 22:39:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:42 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80040, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000240)={{0xffffffffffffffff, 0x1, 0x100000000, 0x3, 0x1b5}, 0x8, 0xfffffffffffffff9, 'id0\x00', 'timer1\x00', 0x0, 0x7fff, 0x8, 0x3, 0x7}) close(r0) socket$inet6(0xa, 0x6, 0xffffffff) socket$vsock_stream(0x28, 0x1, 0x0) io_submit(0x0, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x703000}]) statx(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x4800, 0x1, &(0x7f0000000080)) 22:39:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000040)={{0x6, 0x1000}, {0x7, 0x7}, 0x7, 0x4, 0xd6}) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:42 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x7, &(0x7f0000000200)={0x0, @in6={{0xa, 0x0, 0x0, @local}}, [0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x8000fff, 0x0, 0x80000000000]}, &(0x7f0000000300)=0x100) 22:39:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x10000000000000}, 0x0) 22:39:42 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:42 executing program 6: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x2000, 0x82) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r1, 0x2, 0x6}, &(0x7f00000001c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000002240)={@local, @empty, 0x0}, &(0x7f0000002280)=0xc) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000022c0)={@mcast2, r2}, 0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$inet(r4, &(0x7f0000000040)="7078077074f43730d0370fd5877f99ff00d191145276f9127fbe32dedc6f63181ab91f849cf253", 0x27, 0x8800, &(0x7f0000000080)={0x2, 0xffffffff, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) close(r3) 22:39:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x10000000}, 0x0) 22:39:43 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6bbc, 0x100) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev={0xac, 0x14, 0x14, 0xf}, r1}, 0xc) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000240)=0x4) inotify_init() connect$can_bcm(r0, &(0x7f00000000c0)={0x1d, r1}, 0x10) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x8, 0x0) 22:39:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x8040) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000040)=""/170) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0), 0x0, 0x0, 0x0) 22:39:43 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000280)) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=@delsa={0x174, 0x11, 0x8, 0x70bd28, 0x25dfdbfd, {@in, 0x4d4, 0xa, 0xff}, [@extra_flags={0x8, 0x18, 0xbfc}, @tmpl={0x144, 0x5, [{{@in=@dev={0xac, 0x14, 0x14, 0x13}, 0x4d2, 0x7e}, 0x2, @in6=@mcast2, 0x34ff, 0x2, 0x0, 0x2, 0x0, 0x3, 0x81}, {{@in6=@loopback, 0x4d6, 0x7f}, 0x2, @in6, 0x3505, 0x5, 0x3, 0x100000001, 0x6, 0x400, 0x7}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x0, @in=@multicast2, 0x0, 0x3, 0x0, 0x8000, 0x9, 0x1, 0x5}, {{@in=@local, 0x4d6, 0x7f}, 0xa, @in6=@remote, 0x3504, 0x3, 0x3, 0x3c4, 0x400, 0x8, 0x7e0}, {{@in6=@loopback, 0x4d5, 0xff}, 0x2, @in6=@ipv4={[], [], @rand_addr=0x2}, 0x3500, 0x2, 0x1, 0x1000, 0x7fff, 0xfffffffffffffeff, 0x100000000}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x1}, 0x24008001) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000002c0)=""/254, &(0x7f00000003c0)=0xfe) 22:39:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0), 0x0, 0x0, 0x0) 22:39:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:43 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'erspan0\x00', {0x2, 0x4e22, @loopback}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x400, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000080)=0x7b) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f00000000c0)={0x2, 0x7, 0x40, 0x0, 0x1e}) getsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000140), &(0x7f0000000180)=0x4) write$UHID_DESTROY(r1, &(0x7f00000001c0), 0x4) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000200)={0x7, 0x6, 0x3c, 0x0, 0xd}) connect$bt_rfcomm(r1, &(0x7f0000000280)={0x1f, {0x9, 0x3, 0x4, 0x9, 0x9, 0x68f}, 0x4}, 0xa) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f00000002c0)={0xfffffffffffffffb, 0x3, 0x2, 0x2d53000000000000, 0x1, 0x4d}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x9}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000380)={r2, 0x1000, "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"}, &(0x7f00000013c0)=0x1008) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000001400)={0x100000001, 0x5, 0xb6f, 0x7f, r3}, &(0x7f0000001440)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000001480)={r2, 0x800}, &(0x7f00000014c0)=0x8) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000, 0x2, &(0x7f0000fff000/0x1000)=nil) signalfd(r1, &(0x7f0000001500)={0x6}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000001580)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000001540)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000015c0)={0xa, 0x4, 0xfa00, {r5}}, 0xc) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000001600)={r4, 0x7ff, 0x20}, 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000001640)={r3, @in6={{0xa, 0x4e22, 0xffffffffffffffff, @dev={0xfe, 0x80, [], 0x20}, 0xfff}}, [0x7fff, 0x21, 0x6, 0x5, 0x8001, 0x8000, 0x4, 0x965, 0xa4, 0x1, 0x5, 0x5ec, 0x1f, 0x5eb, 0x10001]}, &(0x7f0000001740)=0x100) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000001780)) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000017c0)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000001800)={{0x0, 0x1, 0x1, 0x2, 0xaf9}}) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000019c0)={0xc, 0x8, 0xfa00, {&(0x7f0000001840)}}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000001a00), &(0x7f0000001a80)=0x68) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000001ac0)={r1, 0x777b, 0x5, r1}) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000001b00)) sendto(r0, &(0x7f0000001b80)="af234b35b7c64f7a127aa08a31aecd6441905526306ff25e12fd", 0x1a, 0x40, &(0x7f0000001bc0)=@ax25={0x3, {"e406bcaee0f540"}, 0x32a}, 0x80) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000001c40), &(0x7f0000001c80)=0x8) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000001cc0)={0xe7}) 22:39:43 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000, 0x84) r3 = perf_event_open$cgroup(&(0x7f0000000040)={0x7, 0x70, 0x8, 0x6, 0x0, 0xfffffffffffffffb, 0x0, 0x6, 0x0, 0x4, 0x8000, 0x73, 0x1, 0x0, 0xffffffffffffff80, 0x100000001, 0xef, 0x8, 0x8, 0x70, 0x2, 0x0, 0x8, 0x80000000, 0x100000001, 0x40, 0x5, 0x4a8, 0x9f9e, 0x6, 0x7ff, 0x6, 0x5, 0x4, 0x7f, 0x6612b7b2, 0x8, 0x5, 0x0, 0x6, 0x0, @perf_config_ext={0x6, 0x2}, 0x4, 0x1, 0x7fff, 0x1, 0x3fc, 0x100000000, 0xd6}, r1, 0x0, 0xffffffffffffff9c, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x1d, r4}, 0x10, &(0x7f0000000380)={&(0x7f0000000840)=ANY=[@ANYBLOB="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", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x7530, @ANYBLOB="0000006001000000030000a0060100008758a65756adff689a6f82ef13e3acb3c53b6323b7316f7223c72a58715403e49f9bb869211b716b2d8858799033e1a39a7cfaaa976fb3d289845d1363c1291d48228203ce026602d53f4d51094c4d58f81ec5c6ac0820567c5643d535d41bc65ecdafed9f078017cef1316f7b6db7500b13b2599b31529c125548c1b2bcedf744074709ad7b5790372b2241f597fd90840d598fac5ff4b2e5c6ea10666d5835ab72db2ef8bb64101830746a6df72fd1fe1bf74691c0f387d41805caee5406c126393458ba79e5853c5b5cea08b89ea5d5eb8c40e12def061a7c4a1f1346d16325a39246"], 0x80}, 0x1, 0x0, 0x0, 0x4044040}, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) bind$bt_hci(r2, &(0x7f0000000400)={0x1f, r4, 0x2}, 0xc) 22:39:43 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x10000) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x800) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f0000000040)='./bus\x00', 0x0) stat(&(0x7f0000000200)='./bus\x00', &(0x7f0000000280)) getgroups(0x7, &(0x7f0000000080)=[0x0, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee00]) r4 = getegid() stat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() getgroups(0x1, &(0x7f00000001c0)=[r5]) getgroups(0x4, &(0x7f0000000180)=[r3, r4, r5, r6]) 22:39:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x2}, 0x0) 22:39:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0), 0x0, 0x0, 0x0) 22:39:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:43 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x101, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x735b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x402000, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f00000002c0)={0x1, 0x0, {0x11, 0x13, 0x1, 0x19, 0x3, 0x6, 0x3, 0xc0, 0xffffffffffffffff}}) mq_timedreceive(r1, &(0x7f0000000200)=""/107, 0x6b, 0x6, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x20880, 0x0) getpeername$packet(r3, &(0x7f0000000140), &(0x7f00000001c0)=0x14) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000000}, 0x44000) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/251) syz_open_dev$adsp(&(0x7f0000000500)='/dev/adsp#\x00', 0x800, 0x8100) sendto(r2, &(0x7f0000000400)="ae711f34e927a4d4a71ba83fc45321d3a541f2de1417ba200f23dc4710322891ccb3c3406e20c06a7f3dde84d79ac57db71315868888ff59f2d39d44ccac6f101e4353b8e127566c3212b61ed64c4d4afa05ca8e7fa35d341b4d9e10b6e8aec919391d48ade91b7095b9590940208236cb18a2971005a07a4446988ac7728828", 0x80, 0x20000000, &(0x7f0000000480)=@sco={0x1f, {0x1, 0x1, 0x4000000, 0x7bb2, 0x6, 0x80000001}}, 0x80) 22:39:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x404400) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x1, 0x100000000000800) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x3f, 0x1, 0x1000000008, 0x7, 0x1, 0x0, 0x0, 0x4, 0x0}, &(0x7f0000000080)=0x20) syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000000c0)={r2, 0x3}, 0x8) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) fcntl$setpipe(r0, 0x407, 0x2c3) 22:39:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x2000000}, 0x0) 22:39:44 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:44 executing program 6: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000440)='cgroup.procs\x00', 0x2, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) syz_mount_image$nfs4(&(0x7f0000000180)='nf%4\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x84000, &(0x7f0000000700)='*&[\'\x00') ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000280)) r2 = memfd_create(&(0x7f0000000040)='cgroup.procs\x00', 0x3) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140), &(0x7f0000000240)=0x4) 22:39:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x280000, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:44 executing program 2: sched_setaffinity(0x0, 0x1cd, &(0x7f0000da3000)=0x2) accept4$llc(0xffffffffffffffff, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x10, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x40, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x37964e4161da538f, r1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = epoll_create1(0x0) epoll_wait(r5, &(0x7f0000000000)=[{}], 0x1, 0x6a8d) epoll_wait(r5, &(0x7f0000000040)=[{}], 0x1, 0x4e5) ppoll(&(0x7f0000000080)=[{r4, 0xc520}, {r5, 0x10}, {r4, 0x8}, {r5, 0x400}, {r5, 0x4}, {r5}], 0x6, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000100)={0x2d4}, 0x8) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000cd8ff4)) 22:39:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000040)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000080)) 22:39:44 executing program 6: unshare(0x400) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') sendmsg$netlink(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0x1440}], 0x1, 0x0, 0x0, 0x4000040}, 0x8004) getdents64(r0, &(0x7f0000000000)=""/65, 0x41) 22:39:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="000000002fa82ff21205cebb2c6541228100000000"]}) close(r2) close(r1) 22:39:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x1000000000000000}, 0x0) 22:39:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x410a00) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x7e}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x4}, 0x8) r3 = msgget$private(0x0, 0x170) msgctl$IPC_RMID(r3, 0x0) 22:39:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x10000000000000}, 0x0) 22:39:45 executing program 6: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'HL\x00'}, &(0x7f00000001c0)=0x1e) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000140)=ANY=[]) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r0, 0x200000028200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0xd7, "741e59c0e124a361dea2797abe245882ca099d0d63c28699bb97a011c63c0ab13478c974d7f296f5ce8c18ac67580cfcef16e2e637b6ae7358447c09c20f2bfed5ff384903f39b75c286c7764abd355ed86dcf852251913f855eb237c58132f30cb449ab9b78c72fd41a451e206dc36653e01753046b4a6dc6df41f98528571a8a3edaca58902409d1ffcf3fb3deba0e6c17af6d668a971141713071911f0e28e78350a00b8f0ea25760b9001f3465ff7180dc35e1fb91503cd6b38711d255f4dace63f9b5e4a947a353b4ccdfeae0139060baab4f8874"}, &(0x7f0000000080)=0xdf) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000300)={r3, 0xdd, "66014ae0925fd707c99566a25a9d348fbb4eb6ca53364584da3f65e253d12b21c8602b83f0c81e2362b62a1788209a7ff13c4d3854e4ea34204fd4593ec6f2f05f6ee3e48f6e044852a232295a8bb4b5afcae28e7102142a56dcfb1b245c9a0205edfcb629b90e77fddb1ec3887759dc051577b64746bff233dcf80a8cd39ab127d40bb5234195b7ce8eaaee8c700ae2849aaa4757d3e830e7aff9e1777f70e9f3cc5c641016eb9ff47d75fdca9ba328b722779140a828623d6a53a2e66c52cb15b37ee8adf3d9b339886b54ea2f14395be54166985ddbd8e7c05e3831"}, &(0x7f0000000100)=0xe5) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") 22:39:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0), 0x0, 0x0, 0x0) 22:39:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x20, {0x9, 0x8, 0x4, 0x7, 0xa1f9, 0x2}, 0x9, 0xffffffffffffff4c}, 0xe) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x6, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000080)='s\x00') r2 = dup3(r0, r0, 0x0) ioctl$BLKRAGET(r2, 0x1263, &(0x7f00000000c0)) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) 22:39:45 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0), 0x0, 0x0, 0x0) [ 1718.487870] input:  as /devices/virtual/input/input44 22:39:45 executing program 4: rmdir(&(0x7f0000000000)='./file0\x00') r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x8000) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000040)="baf80c66b81081d98d66efbafc0c66b8f700000066ef66650f18c9bad004b099eef4f40f07643e337f710f01cf660f3a099c0b00000fc76a70", 0x39}], 0x1, 0x0, &(0x7f00000000c0)=[@cr4={0x1, 0x20}], 0x1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f0000000280)=0x44) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) [ 1718.509265] input:  as /devices/virtual/input/input45 22:39:45 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e24, 0xffff, @empty, 0xfffffffffffffffe}, 0x1c) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000040)=ANY=[@ANYBLOB="90cd"], &(0x7f0000000340)=0x1) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x0, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 22:39:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x301900, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x4, 0x1ff}) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r4, 0x6, 0x1e, &(0x7f0000013ff4)={@local, @rand_addr, @remote}, 0xc) close(r4) dup3(r1, r3, 0x0) 22:39:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0), 0x0, 0x0, 0x0) 22:39:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000040)={'ip6tnl0\x00', @local}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(generic-gcm-aesni)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x200000000000000}, 0x0) 22:39:45 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = getpgid(0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000140)=0x8) preadv(r0, &(0x7f0000000780)=[{&(0x7f00000001c0)=""/130, 0xb1}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000080)) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)=0xb97) read(r2, &(0x7f00000000c0)=""/11, 0xfffffcc7) r3 = syz_open_pts(r2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000003c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000400)={{{@in6, @in6=@mcast1, 0x4e21, 0x1, 0x4e24, 0x0, 0xa, 0x20, 0x80, 0x84, r4, r5}, {0x25a, 0x101, 0x0, 0x6, 0x1000, 0x10001, 0x10001, 0x5}, {0x7, 0x2, 0x11, 0x2}, 0x1, 0x6e6bb0, 0x3, 0x0, 0x1, 0x3}, {{@in6=@loopback, 0x4d6, 0x7e}, 0x2, @in=@multicast1, 0x3507, 0x0, 0x0, 0x3, 0x3ff, 0x883, 0x200}}, 0xe8) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000280)) 22:39:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2000, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000040)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="422949c03bd72dac69e0f574aa08a26a833eaf890d6a2002d8c3b68c0efd9ba04793f7bbb58d8f0f3b34bcc1d6105dba56d8988fe1148a4f1aa5e3cd87859165553c31063397054f06f8ca02c60676f61d254da107b1b4627763d4a6bca47e160a10ef619cb0e5ba", 0x68, 0x10001}], 0x0, &(0x7f0000000280)={[{@umask={'umask'}}]}) write$binfmt_elf32(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x100000000, 0xfffffffffffffffc, 0x4, 0x2, 0x7, 0x26fa, 0xb3, 0x38, 0x0, 0x7, 0x7, 0x20, 0x1, 0x100, 0x3, 0x9}, [{0x2, 0x6, 0x74, 0xff, 0x10000, 0x9, 0x100000000, 0x65ded970}, {0x6474e557, 0x8, 0x8, 0x8, 0xfffffffffffffffc, 0x10000, 0x8, 0x2}], "c4800cba71307a9479d46663052f4300445d66236ddc8aaebec7ec451a803d25a84b746313c173a497d893882cd19afc88dc974d", [[], [], [], [], [], []]}, 0x6ac) [ 1718.996717] hfsplus: unable to find HFS+ superblock 22:39:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x100000000000000}, 0x0) 22:39:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000040)={0x87, @broadcast, 0x4e23, 0x3, 'fo\x00', 0x4, 0x900000000000, 0x2c}, 0x2c) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0', [{0x20, '/dev/snd/controlC#\x00'}, {0x20, 'rfc4106(gcm(aes))\x00'}, {}], 0xa, "932c4846e54c7d3a87e6ea167b8c1f898ff55cee175fc566fc92f564472b792ccfd49835c47a2e49606f9aa1e517dc40bb594b326cdbebcee9140b37d23787157a9fac4990750dcbb9245d1d575136a79128058a0fc1335b4ca0f0607f17a8938eea74be244f99a15001b888fc"}, 0xa0) readv(r1, &(0x7f00000014c0)=[{&(0x7f00000003c0)=""/111, 0x6f}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/68, 0x44}], 0x3) accept4(r0, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, &(0x7f0000000100)=0x80, 0x80000) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000140)) r3 = syz_open_dev$sndctrl(&(0x7f0000000280)='/dev/snd/controlC#\x00', 0x6, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f00000002c0)=0xfffffffffffffffa) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x2, 0x200) 22:39:46 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) socketpair$inet6(0xa, 0x80f, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x80}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000000c0)={r2, 0x6, 0x30, 0x5, 0xf800000000000000}, &(0x7f0000000100)=0x18) 22:39:46 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000100)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x800000000004, 0x20011, r2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in=@broadcast, @in6=@loopback, 0x4e20, 0x0, 0x4e24, 0x401, 0xa, 0x80, 0x80, 0x3c, 0x0, r3}, {0x3, 0x3, 0x8, 0xffff, 0x3, 0x3, 0x8, 0x8}, {0xd255, 0xffffffffffffffc1, 0xdc, 0x8}, 0x5, 0x0, 0x3, 0x1, 0x1, 0x1}, {{@in=@multicast1, 0x4d4, 0xff}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x1b}, 0x3503, 0x2, 0x2, 0x6, 0xfff, 0x0, 0xbc}}, 0xe8) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x76, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x98) 22:39:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0x0, 0x2}], 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="7768696e745f6d6f64653d6f66662c696e6c696e655f64656e7472792c70726a73718df574613d61656164002c00"]) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) [ 1719.768006] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1719.775191] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 1719.799256] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1719.806603] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 22:39:46 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) fcntl$setown(r0, 0x8, r1) truncate(&(0x7f0000000040)='./file0\x00', 0xfff) truncate(&(0x7f0000000080)='./file0\x00', 0x8) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe, 0x100000002080100}, 0xc) [ 1719.815992] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1719.823457] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 1719.832166] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1719.839514] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 1719.865120] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1719.872591] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 22:39:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x10000000}, 0x0) 22:39:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="8b29353e3974cdf5c130472f7753606f459e1eef35cd6ee4dbce06a228f684a35c76abeaa9ccbaac6251462ef465023c6f267e19b32b292283b8e56f43720cb1c3d5131d7df794e4926e2ba3f28b25afdcf1db8a7d8b393c09f13c465e5ed3f2304ab019af605a0db35d8ef1df48056596c3a8150657e631", 0x1f5) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0xaca87eba1ff66c3f) 22:39:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2) ioctl$BLKRRPART(r1, 0x125f, 0x0) getsockopt$packet_int(r0, 0x107, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socket$nl_route(0x10, 0x3, 0x0) 22:39:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:46 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x8180, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r3, 0x120, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xb935}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2d}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000810}, 0x4040000) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x19}, 0x10) 22:39:46 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x3c, &(0x7f0000000040)="eb81826bf6923f8b021ce31952c63fec82983c8cf68bbb06738102429a8864d651f5480ca53abc08881aa5d2e7d6f84f8b1a8f5f062052cea996a02239868b176175c5c4ed313fefeab0f417b885f08bf1302bae15aca31b7cb0ea3a97a1f3a51791bc8d656e5b96262a106ffa4c12c43f2fcbaf876d25f0639d3ae0", 0x7c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:46 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x10}, 0x0) 22:39:46 executing program 2: socketpair$unix(0x1, 0x803, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000bc000)=@abs, 0x8) getgroups(0x6, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xee01]) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r4, &(0x7f0000000280)="fa6c2b47d21570be492657371d2048b74568a2fe7fb788dfe3f1453ba176d0a56733e04970a64b4f1d30dcb1e9c2bb1b7131054f39775a7fdff00af6ae90791fd50f489a5dd6774f20699edda8300f45e780e1398235c62a15a706a24b95340aebde75ab3f28f4f8789a1d0138a39ab1da6e998efb1e0607e249173a33e6703d4e2199653b403b621be53d8dd79e073a1cc748b6d6fe9660ced5c5d59aae22c77d85a616fd50b7b58565c03005e6cdc7c41356ccfee43de41d", &(0x7f0000000340)=""/123}, 0x18) setregid(r2, r3) bind$unix(r1, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r0, &(0x7f0000c8e000)=@file={0x1, './file0\x00'}, 0xa) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 22:39:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) prctl$setmm(0x23, 0x3, &(0x7f0000ffc000/0x2000)=nil) 22:39:47 executing program 2: getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000300)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x70b5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x21, 0x2) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x6, 0x3f, 0x2ed, 0xfffffffffffffdc6, 0x8}, &(0x7f00000001c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000340)=0xe8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000280)={r1, 0x5, 0x30, 0x8}, &(0x7f00000002c0)=0x18) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3e, 0x20000) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x800, 0x4) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000100)=0x8) 22:39:47 executing program 6: r0 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0xbf1a4a1a6763d713, r0, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x1f, 0xffffffffffffff00, 0x400, 0x6, 0x0, 0xfff, 0x2004, 0xa, 0x81, 0x2, 0x5, 0x0, 0x6, 0x0, 0x9, 0x20, 0x1, 0x1, 0x40, 0x9a32, 0x7, 0x20, 0x7ff, 0x40, 0x9, 0x7fffffff, 0x8cf7, 0x7fff, 0x100000000, 0x99, 0xffffffffffffffff, 0xc6c, 0x7, 0x6, 0x231, 0x7, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x10104, 0x2, 0x1000, 0x7, 0xffffffff, 0x9}, r1, 0x9, r0, 0x1) 22:39:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0xffffff67) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x3c0) 22:39:47 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a65c80700314f85715070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000080)=0x61) read(r1, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)) r2 = syz_open_pts(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000300)={'team0\x00', r3}) ioctl$TCSETS(r1, 0x541f, &(0x7f0000000000)) membarrier(0x40, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x80) ioctl$TCXONC(r2, 0x540a, 0x0) r4 = open(&(0x7f00000014c0)='./file0\x00', 0x40, 0x101) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000140), 0x4) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000001500)=0x81, &(0x7f0000001540)=0x4) 22:39:47 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000040)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 22:39:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4000, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000040)={0x7, 0x4b, 0x1}, 0x7) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x1000000}, 0x0) 22:39:47 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7, 0x440) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@local, @in, 0x4e24, 0xfffffffffffffffa, 0x4e20, 0x0, 0xa, 0x80, 0x80, 0x3c, r1, r2}, {0x2, 0x1, 0x618, 0x3, 0x7, 0x9, 0x8, 0xffffffffffffffe1}, {0xffffffffffffffff, 0x7ea, 0x3, 0x100000001}, 0x81, 0x6e6bb9, 0x1, 0x1, 0x1, 0x1}, {{@in6=@mcast1, 0x4d2, 0x32}, 0xa, @in6=@mcast1, 0x0, 0x0, 0x3, 0x1be3, 0xfffffffffffffe00, 0x4, 0x800}}, 0xe8) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f00000002c0)={@empty, @local}, 0x229) [ 1720.932431] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 1720.945771] netlink: 'syz-executor2': attribute type 1 has an invalid length. 22:39:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x1, 0x0) accept4$bt_l2cap(r1, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x80800) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0xffe0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:47 executing program 2: mkdir(&(0x7f0000000180)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000040)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') r2 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000740)}}, r2, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./control/file2\x00', &(0x7f0000000280)='./control\x00', &(0x7f0000000400)='securityfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f00000004c0)={0x0, {{0x2, 0x4e23, @remote}}, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x16}}}}, 0x108) close(r0) 22:39:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000000)=@req) socket$inet6(0xa, 0x80a, 0x0) 22:39:47 executing program 6: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44032, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6f6f6d5f73626f72655fa50f2247c4269643c352409a29b2d94af041d0bc54c3901b356f33462dcf38dc") setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000000)={{0x69a8676c30ed12e6, @local, 0x4e20, 0x0, 'ovf\x00', 0x20, 0x8, 0xe}, {@local, 0x4e20, 0x2000, 0xff, 0x80, 0x6}}, 0x44) 22:39:47 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x700000000000000}, 0x0) 22:39:47 executing program 5 (fault-call:5 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:47 executing program 1 (fault-call:5 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:47 executing program 6: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x5, 0x2, &(0x7f0000000300)=[{&(0x7f0000000240)="618a", 0x2, 0x1}, {&(0x7f0000000280)="5d38cf614992f57bb8760e3bf5b16185d6d967cdf773bbbb29324a07d9c9100a12f2fdea6399737640a4070e61623c167ab2bbf8fb7eece4f55e85664dc809bbfd35f58abb14", 0x46, 0x9}], 0x2, &(0x7f0000000340)={[{@force='force'}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000440)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)=0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e5, 0x0, 0x2b6b, 0x0, 0x0, 0x9, 0x22101, 0x0, 0x200000000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5027f526, 0x0, 0x0, 0x9e5, 0x0, 0x100, 0xfffffffffffffffc, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x80000000, 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f00000003c0)) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000400)={0x18, 0x0, {0x0, @broadcast, 'ipddp0\x00'}}) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f00000005c0)) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000040)={r3, 0x0, 0x7, 0x7, 0x10000}) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)=ANY=[@ANYBLOB="06000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) sendmsg$nl_route(r1, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001e0000012abd7000feff7f2500000000"], 0xfffffffffffffeec}, 0x1, 0x0, 0x0, 0x4004}, 0x8000) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f0000000100)) ioctl$SG_GET_NUM_WAITING(r3, 0x227d, &(0x7f0000000480)) 22:39:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) [ 1721.538743] hfsplus: unable to find HFS+ superblock [ 1721.570641] hfsplus: unable to find HFS+ superblock 22:39:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0x2000057d}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) r1 = socket(0x19, 0x80003, 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x1, 0x22, 0x8, 0x5, 0xffffffff, 0x4, 0x100, 0x4, 0x0}, &(0x7f0000000040)=0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000080)={r2, @in={{0x2, 0x4e20, @rand_addr=0x9}}, 0x6, 0xa44, 0x80000001, 0x4173, 0x20}, 0x98) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x3000000}, 0x0) 22:39:48 executing program 6: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x2081fc) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000300)=""/200) madvise(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x2) write$P9_RLCREATE(r1, &(0x7f0000000000)={0x18}, 0x18) rt_sigprocmask(0x1, &(0x7f0000000040)={0x2}, &(0x7f0000000080), 0x8) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) mount$9p_fd(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_user='access=user'}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1ff) 22:39:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0x2000057d}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:48 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@ipv4={[], [], @remote}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) sendmsg(r1, &(0x7f0000000740)={&(0x7f0000000200)=@ll={0x11, 0x10, r2, 0x1, 0x6, 0x6, @remote}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000280)="02037416492ee9c4f86d79ad8332d2", 0xf}, {&(0x7f00000002c0)="bd21350ee1457376004b3de09deb3fdf8a0a60865d31a369dc48883fcd5b3a007f45d28091f0b93c1b", 0x29}, {&(0x7f0000000300)="3a923901bd7f4f3fdc7cca829256e5e5d6e72b4c10672cb4872888f060e49e778fadd636d177455becabd742575575e0c147d0cf2460d8af7cdc69e6507b8ecce59c0cfd6a8c1756bf9d", 0x4a}, {&(0x7f0000000380)="52e123715a793509a7806a48a58aed6c25ffa005a5a352530d1162c4fdd7f4447cdd6a2ee809468f90a77bd1826be19db0d1fe76a8650440fc9eefd3f3ad7e07cb334b8757ea81c889c66b97d2d24f87d99af5ec6b42effb6e5933874117eb9fe3757f57d8f1", 0x66}, {&(0x7f0000000400)="73384486cbdeee0139bc3b7281e66632dfc14748f5c756238d2b88fd5033dd494541c6034c0d80c8696f702bbccd94c63e906e6eca4bc15c1db1c89308ff0100ab467ed298571b0459f20ca3a1f0da9ee64afc5f12f6c0e3cf0b9c7e8db2091f25bd2b3cb73360c05ac2fbcf7dacba59af2335c3f3b04a6ce7acdb7b74efa09a3d75a1f6a08a", 0x86}, {&(0x7f00000004c0)="3b28e1e0a65d35fc2f1547945ba826fb56b81b16c61980c33eab587c9fe2ea35e69a06db3ed1d5fe1d864d310aa88b73e8999b875fa6e611a56d87a528657d0606dc6c67d0d8f4498a77e952e49aca8d4aeab89715d6351143276b1d87c37bf58de0496e4387298febee5900f571152c615a4e9e1bcbc50369ee5803486d63495257ef", 0x83}, {&(0x7f0000000580)="eecf7c55484b565e07ea0d6ffd164615ffe02cec77804350af200ffe32c1cdfff076172760be6eaf2d4cd752769dc96c86fa2a8b218c76898d59c415133a256f969dbf9329ab1676c57ca2fda77c9e5b1688959faaec2b2e61c424ef90cfe3eef6c10b2299d3746aa0f8592dd36f7f0150e2e317d15944a43923c16c33eabc19602e7f2547d62854d22dd56083b121ad0197357b74e8c7254c6163169c0355a9ff1a3d438dea34f869647c8bcc7fddc36a1de565493bd4599299eb5786102a3435dcb789eac9745100a8d55b7bbc2dafa1a819a9", 0xd4}, {&(0x7f0000000680)="662e4e801b09d9b69d3422d4a09d5b7d2abb2329ced6b052a4e87991d00f5636fe8be2de3a2b02", 0x27}], 0x8, 0x0, 0x0, 0x4000000}, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000780)="76626f786e6574317b7bab706f7369785f61636c5f6163636573736d696d655f7479706500") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b40000000000000095000000000000009500000019000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 22:39:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0x7ffff000}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0xffffffffffffff86) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) 22:39:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0x7ffff000}], 0x1, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x700}, 0x0) 22:39:48 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) 22:39:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x1) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000040)) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="4fcff9bfb780b73f93a6000008000000000000000000", 0xffffffffffffffc6) 22:39:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040), 0x0) sendto(r0, &(0x7f0000000180)="2d3c39946a1217c01d10f7d7b077f464c6b65f391afe84c1496757e6f2e2f38584514f788e2017cc40074ce89d2082eb6961c99eff2c4c96162074853f23906696417235c7f2bc1a61dac6a31a6f7f70d687c86c275212889f7e7f78d4fabde62f316fb31b9007b21f40fb6ec9a2675929be3e87", 0x74, 0x4000004, &(0x7f0000000200)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x2, 0x1, "e49dd72ef1f7820e5549d7d425ef7db7b5e6124cf6d71d0ca5591069dd8c9175bd77ae565d8741a71656c6d4c789be9a277fc3409c70dbbb5943b8bb922556", 0x9}, 0xfffffffffffffd7c) close(r1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 22:39:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x10, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x2, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) 22:39:48 executing program 2: r0 = socket$kcm(0x29, 0x805, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000380)={r0}) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000003c0)) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000480)=""/96, 0x60}, 0x0) 22:39:49 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffff, 0x101400) fgetxattr(r0, &(0x7f00000002c0)=@known='system.posix_acl_default\x00', &(0x7f0000000300)=""/20, 0x14) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80001000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x64, r1, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x10001}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x80) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000340)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) write$P9_RFLUSH(r0, &(0x7f0000000280)={0x7, 0x6d, 0x1}, 0x7) 22:39:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000a340)={&(0x7f00000000c0), 0xc, &(0x7f000000a300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/189, 0xbd}], 0x2, &(0x7f0000000000)=""/83, 0x53}}], 0x1, 0x0, 0x0) [ 1722.781007] ================================================================== [ 1722.788804] BUG: KASAN: use-after-free in work_is_static_object+0x39/0x40 [ 1722.795742] Read of size 8 at addr ffff8801c0b526a0 by task kworker/1:2/3602 [ 1722.802928] [ 1722.804580] CPU: 1 PID: 3602 Comm: kworker/1:2 Not tainted 4.18.0+ #194 [ 1722.811360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1722.820753] Workqueue: events p9_poll_workfn [ 1722.825191] Call Trace: [ 1722.827809] dump_stack+0x1c9/0x2b4 [ 1722.831466] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1722.836718] ? printk+0xa7/0xcf [ 1722.840025] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1722.844790] ? work_is_static_object+0x39/0x40 [ 1722.849378] print_address_description+0x6c/0x20b [ 1722.854233] ? work_is_static_object+0x39/0x40 [ 1722.858826] kasan_report.cold.7+0x242/0x2fe [ 1722.863255] __asan_report_load8_noabort+0x14/0x20 [ 1722.868238] work_is_static_object+0x39/0x40 [ 1722.872681] debug_object_activate+0x2fc/0x690 [ 1722.877299] ? __wake_up_common+0x740/0x740 [ 1722.881648] ? debug_object_assert_init+0x4b0/0x4b0 [ 1722.886704] ? mark_held_locks+0xc9/0x160 [ 1722.891056] __queue_work+0x1ca/0x1410 [ 1722.894961] ? __wake_up+0xe/0x10 [ 1722.898441] ? p9_client_cb+0x62/0x80 [ 1722.902280] ? flush_rcu_work+0x90/0x90 [ 1722.906275] ? p9_fd_cancelled+0x2f0/0x2f0 [ 1722.910530] ? kasan_check_write+0x14/0x20 [ 1722.914772] ? do_raw_spin_lock+0xc1/0x200 [ 1722.919007] ? _raw_spin_unlock+0x22/0x30 [ 1722.923149] ? unix_dgram_poll+0x3c3/0x6c0 [ 1722.927472] ? unix_writable.part.15+0x180/0x180 [ 1722.932241] ? sock_poll+0x33e/0x4a0 [ 1722.935959] ? sock_ioctl+0x680/0x680 [ 1722.939764] ? mark_held_locks+0xc9/0x160 [ 1722.943922] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1722.948533] queue_work_on+0x19a/0x1e0 [ 1722.952453] p9_poll_workfn+0x55e/0x6d0 [ 1722.956470] ? p9_read_work+0x1060/0x1060 [ 1722.960638] ? graph_lock+0x170/0x170 [ 1722.964442] ? lock_acquire+0x1e4/0x540 [ 1722.968431] ? process_one_work+0xb9b/0x1ba0 [ 1722.972849] ? kasan_check_read+0x11/0x20 [ 1722.977005] ? __lock_is_held+0xb5/0x140 [ 1722.981091] process_one_work+0xc73/0x1ba0 [ 1722.985323] ? trace_hardirqs_on+0x10/0x10 [ 1722.989577] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 1722.994256] ? __switch_to_asm+0x34/0x70 [ 1722.998321] ? __switch_to_asm+0x40/0x70 [ 1723.002384] ? __switch_to_asm+0x34/0x70 [ 1723.006441] ? __switch_to_asm+0x40/0x70 [ 1723.010502] ? __switch_to_asm+0x34/0x70 [ 1723.014583] ? __switch_to_asm+0x40/0x70 [ 1723.018659] ? __switch_to_asm+0x34/0x70 [ 1723.022744] ? __switch_to_asm+0x40/0x70 [ 1723.026806] ? __switch_to_asm+0x34/0x70 [ 1723.030874] ? __sched_text_start+0x8/0x8 [ 1723.035010] ? lock_downgrade+0x8f0/0x8f0 [ 1723.039168] ? graph_lock+0x170/0x170 [ 1723.043000] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1723.047802] ? lock_acquire+0x1e4/0x540 [ 1723.051783] ? worker_thread+0x3dc/0x13c0 [ 1723.055946] ? lock_downgrade+0x8f0/0x8f0 [ 1723.060127] ? lock_release+0xa30/0xa30 [ 1723.064112] ? kasan_check_read+0x11/0x20 [ 1723.068289] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1723.072722] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1723.077329] ? kasan_check_write+0x14/0x20 [ 1723.081581] ? do_raw_spin_lock+0xc1/0x200 [ 1723.085862] worker_thread+0x189/0x13c0 [ 1723.089851] ? __switch_to_asm+0x34/0x70 [ 1723.093955] ? process_one_work+0x1ba0/0x1ba0 [ 1723.098478] ? graph_lock+0x170/0x170 [ 1723.102299] ? graph_lock+0x170/0x170 [ 1723.106130] ? find_held_lock+0x36/0x1c0 [ 1723.110217] ? find_held_lock+0x36/0x1c0 [ 1723.114286] ? lock_downgrade+0x8f0/0x8f0 [ 1723.118426] ? kasan_check_read+0x11/0x20 [ 1723.122575] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1723.127113] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 1723.132251] ? __kthread_parkme+0x58/0x1b0 [ 1723.136497] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1723.141526] ? trace_hardirqs_on+0xd/0x10 [ 1723.145709] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1723.151273] ? __kthread_parkme+0x106/0x1b0 [ 1723.155626] kthread+0x35a/0x420 [ 1723.159031] ? process_one_work+0x1ba0/0x1ba0 [ 1723.163556] ? kthread_bind+0x40/0x40 [ 1723.167384] ret_from_fork+0x3a/0x50 [ 1723.171141] [ 1723.172770] Allocated by task 22970: [ 1723.176576] save_stack+0x43/0xd0 [ 1723.180062] kasan_kmalloc+0xc4/0xe0 [ 1723.183800] kmem_cache_alloc_trace+0x152/0x780 [ 1723.188483] p9_fd_create+0x1a7/0x3f0 [ 1723.192283] p9_client_create+0x8ed/0x1770 [ 1723.197031] v9fs_session_init+0x21a/0x1a80 [ 1723.201354] v9fs_mount+0x7c/0x900 [ 1723.204897] mount_fs+0xae/0x328 [ 1723.208270] vfs_kern_mount.part.34+0xdc/0x4e0 [ 1723.212853] do_mount+0x581/0x30e0 [ 1723.216396] ksys_mount+0x12d/0x140 [ 1723.220013] __x64_sys_mount+0xbe/0x150 [ 1723.224001] do_syscall_64+0x1b9/0x820 [ 1723.227902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1723.233080] [ 1723.234709] Freed by task 22970: [ 1723.238093] save_stack+0x43/0xd0 [ 1723.241739] __kasan_slab_free+0x11a/0x170 [ 1723.245963] kasan_slab_free+0xe/0x10 [ 1723.249767] kfree+0xd9/0x260 [ 1723.252875] p9_fd_close+0x416/0x5b0 [ 1723.256583] p9_client_create+0xa9a/0x1770 [ 1723.260808] v9fs_session_init+0x21a/0x1a80 [ 1723.265122] v9fs_mount+0x7c/0x900 [ 1723.268668] mount_fs+0xae/0x328 [ 1723.272051] vfs_kern_mount.part.34+0xdc/0x4e0 [ 1723.276623] do_mount+0x581/0x30e0 [ 1723.280148] ksys_mount+0x12d/0x140 [ 1723.283769] __x64_sys_mount+0xbe/0x150 [ 1723.287750] do_syscall_64+0x1b9/0x820 [ 1723.291660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1723.296847] [ 1723.298462] The buggy address belongs to the object at ffff8801c0b52580 [ 1723.298462] which belongs to the cache kmalloc-512 of size 512 [ 1723.311115] The buggy address is located 288 bytes inside of [ 1723.311115] 512-byte region [ffff8801c0b52580, ffff8801c0b52780) [ 1723.323009] The buggy address belongs to the page: [ 1723.327954] page:ffffea000702d480 count:1 mapcount:0 mapping:ffff8801dac00940 index:0x0 [ 1723.336098] flags: 0x2fffc0000000100(slab) [ 1723.340334] raw: 02fffc0000000100 ffffea0006de0d08 ffffea0006a68488 ffff8801dac00940 [ 1723.348245] raw: 0000000000000000 ffff8801c0b52080 0000000100000006 0000000000000000 [ 1723.356120] page dumped because: kasan: bad access detected [ 1723.362790] [ 1723.364416] Memory state around the buggy address: [ 1723.369344] ffff8801c0b52580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1723.376698] ffff8801c0b52600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1723.384061] >ffff8801c0b52680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1723.391417] ^ [ 1723.395829] ffff8801c0b52700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1723.403204] ffff8801c0b52780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1723.410567] ================================================================== [ 1723.417919] Disabling lock debugging due to kernel taint [ 1723.423364] Kernel panic - not syncing: panic_on_warn set ... [ 1723.423364] [ 1723.430738] CPU: 1 PID: 3602 Comm: kworker/1:2 Tainted: G B 4.18.0+ #194 [ 1723.438881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1723.448245] Workqueue: events p9_poll_workfn [ 1723.452640] Call Trace: [ 1723.455249] dump_stack+0x1c9/0x2b4 [ 1723.458879] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1723.464077] ? lock_downgrade+0x8f0/0x8f0 [ 1723.468228] panic+0x238/0x4e7 [ 1723.471417] ? add_taint.cold.5+0x16/0x16 [ 1723.475579] ? add_taint.cold.5+0x5/0x16 [ 1723.479629] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1723.484041] ? work_is_static_object+0x39/0x40 [ 1723.488641] kasan_end_report+0x47/0x4f [ 1723.492635] kasan_report.cold.7+0x76/0x2fe [ 1723.496967] __asan_report_load8_noabort+0x14/0x20 [ 1723.501893] work_is_static_object+0x39/0x40 [ 1723.506312] debug_object_activate+0x2fc/0x690 [ 1723.510884] ? __wake_up_common+0x740/0x740 [ 1723.515221] ? debug_object_assert_init+0x4b0/0x4b0 [ 1723.520235] ? mark_held_locks+0xc9/0x160 [ 1723.524386] __queue_work+0x1ca/0x1410 [ 1723.528274] ? __wake_up+0xe/0x10 [ 1723.531729] ? p9_client_cb+0x62/0x80 [ 1723.535519] ? flush_rcu_work+0x90/0x90 [ 1723.539484] ? p9_fd_cancelled+0x2f0/0x2f0 [ 1723.543729] ? kasan_check_write+0x14/0x20 [ 1723.547978] ? do_raw_spin_lock+0xc1/0x200 [ 1723.552222] ? _raw_spin_unlock+0x22/0x30 [ 1723.556359] ? unix_dgram_poll+0x3c3/0x6c0 [ 1723.560611] ? unix_writable.part.15+0x180/0x180 [ 1723.565355] ? sock_poll+0x33e/0x4a0 [ 1723.569095] ? sock_ioctl+0x680/0x680 [ 1723.572907] ? mark_held_locks+0xc9/0x160 [ 1723.577065] ? do_raw_spin_trylock+0x1c0/0x1c0 22:39:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab4f3fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000340)=""/36, 0x20000364}], 0x2, &(0x7f0000000100)=""/123, 0x7b, 0x10}, 0x0) [ 1723.581656] queue_work_on+0x19a/0x1e0 [ 1723.585559] p9_poll_workfn+0x55e/0x6d0 [ 1723.589542] ? p9_read_work+0x1060/0x1060 [ 1723.593718] ? graph_lock+0x170/0x170 [ 1723.597532] ? lock_acquire+0x1e4/0x540 [ 1723.601545] ? process_one_work+0xb9b/0x1ba0 [ 1723.605959] ? kasan_check_read+0x11/0x20 [ 1723.610115] ? __lock_is_held+0xb5/0x140 [ 1723.614178] process_one_work+0xc73/0x1ba0 [ 1723.618403] ? trace_hardirqs_on+0x10/0x10 [ 1723.622640] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 1723.627342] ? __switch_to_asm+0x34/0x70 [ 1723.631400] ? __switch_to_asm+0x40/0x70 [ 1723.635483] ? __switch_to_asm+0x34/0x70 [ 1723.639545] ? __switch_to_asm+0x40/0x70 [ 1723.643611] ? __switch_to_asm+0x34/0x70 [ 1723.647697] ? __switch_to_asm+0x40/0x70 [ 1723.651754] ? __switch_to_asm+0x34/0x70 [ 1723.655811] ? __switch_to_asm+0x40/0x70 [ 1723.659868] ? __switch_to_asm+0x34/0x70 [ 1723.663942] ? __sched_text_start+0x8/0x8 [ 1723.668107] ? lock_downgrade+0x8f0/0x8f0 [ 1723.672277] ? graph_lock+0x170/0x170 [ 1723.676103] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1723.680886] ? lock_acquire+0x1e4/0x540 [ 1723.684876] ? worker_thread+0x3dc/0x13c0 [ 1723.689033] ? lock_downgrade+0x8f0/0x8f0 [ 1723.693211] ? lock_release+0xa30/0xa30 [ 1723.697250] ? kasan_check_read+0x11/0x20 [ 1723.701424] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1723.705968] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1723.710575] ? kasan_check_write+0x14/0x20 [ 1723.714843] ? do_raw_spin_lock+0xc1/0x200 [ 1723.719112] worker_thread+0x189/0x13c0 [ 1723.723281] ? __switch_to_asm+0x34/0x70 [ 1723.727351] ? process_one_work+0x1ba0/0x1ba0 [ 1723.731855] ? graph_lock+0x170/0x170 [ 1723.735848] ? graph_lock+0x170/0x170 [ 1723.739669] ? find_held_lock+0x36/0x1c0 [ 1723.743745] ? find_held_lock+0x36/0x1c0 [ 1723.747844] ? lock_downgrade+0x8f0/0x8f0 [ 1723.752017] ? kasan_check_read+0x11/0x20 [ 1723.756179] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1723.760599] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 1723.765701] ? __kthread_parkme+0x58/0x1b0 [ 1723.769926] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1723.774929] ? trace_hardirqs_on+0xd/0x10 [ 1723.779066] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1723.784596] ? __kthread_parkme+0x106/0x1b0 [ 1723.788907] kthread+0x35a/0x420 [ 1723.792262] ? process_one_work+0x1ba0/0x1ba0 [ 1723.796742] ? kthread_bind+0x40/0x40 [ 1723.800528] ret_from_fork+0x3a/0x50 [ 1723.804572] Dumping ftrace buffer: [ 1723.808099] (ftrace buffer empty) [ 1723.811795] Kernel Offset: disabled [ 1723.815412] Rebooting in 86400 seconds..