x20}], 0x4924924924924d0, 0x0) 01:21:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553f", 0x3) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:09 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x355) 01:21:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:09 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x80000000c020660b, &(0x7f00000001c0)="01000000000000007f") 01:21:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec", 0x4) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:10 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x80000000c0485661, &(0x7f00000001c0)="01000000000000007f") 01:21:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x356) 01:21:10 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec", 0x4) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:10 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x80000000c054561d, &(0x7f00000001c0)="01000000000000007f") 01:21:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:10 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x35e) 01:21:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec", 0x4) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:10 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="03000000000000007f") 01:21:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:10 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x361) [ 307.115634][T15431] autofs4:pid:15431:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(3.0), cmd(0x0000937e) 01:21:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0xf, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 307.223301][T15431] autofs4:pid:15431:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:11 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="05000000000000007f") 01:21:11 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x362) 01:21:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x1c, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 307.509158][T15459] autofs4:pid:15459:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(5.0), cmd(0x0000937e) 01:21:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:11 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 307.661155][T15459] autofs4:pid:15459:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x20000190, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x36d) 01:21:11 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="09000000000000007f") 01:21:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) accept$alg(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) [ 308.059816][T15493] autofs4:pid:15493:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(9.0), cmd(0x0000937e) 01:21:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 308.101784][T15493] autofs4:pid:15493:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:12 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="0b000000000000007f") 01:21:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) accept$alg(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x36e) 01:21:12 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 308.518690][T15515] autofs4:pid:15515:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(11.0), cmd(0x0000937e) 01:21:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) accept$alg(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:12 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 308.646050][T15515] autofs4:pid:15515:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x36f) 01:21:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:12 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="10000000000000007f") 01:21:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) 01:21:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:12 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 309.018653][T15551] autofs4:pid:15551:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(16.0), cmd(0x0000937e) 01:21:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 309.090797][T15551] autofs4:pid:15551:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x387) 01:21:13 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="25000000000000007f") 01:21:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) 01:21:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x8}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x38a) 01:21:13 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 309.480376][T15580] autofs4:pid:15580:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(37.0), cmd(0x0000937e) [ 309.524543][T15580] autofs4:pid:15580:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) 01:21:13 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="63000000000000007f") 01:21:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x200000a6}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x393) 01:21:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 309.802841][T15604] autofs4:pid:15604:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(99.0), cmd(0x0000937e) 01:21:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}], 0x1, 0x0, 0x0) 01:21:13 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 309.862051][T15604] autofs4:pid:15604:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x7ffff000}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:13 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="67000000000000007f") 01:21:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}], 0x1, 0x0, 0x0) [ 310.156013][T15630] autofs4:pid:15630:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(103.0), cmd(0x0000937e) 01:21:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x396) 01:21:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0xffffffffffffffff}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:14 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 310.246716][T15630] autofs4:pid:15630:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:14 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="00030000000000007f") 01:21:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x2}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}], 0x1, 0x0, 0x0) 01:21:14 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 310.618927][T15656] autofs4:pid:15656:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(768.0), cmd(0x0000937e) 01:21:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x39d) 01:21:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 310.686344][T15656] autofs4:pid:15656:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x200000d2}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:14 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="bd030000000000007f") 01:21:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x39e) 01:21:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x7fffefda}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 311.059236][T15686] autofs4:pid:15686:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(957.0), cmd(0x0000937e) 01:21:14 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000), 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 311.145991][T15686] autofs4:pid:15686:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:15 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="00ff0000000000007f") 01:21:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x8}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 311.416981][T15711] autofs4:pid:15711:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(65280.0), cmd(0x0000937e) 01:21:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3a2) 01:21:15 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000), 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x12}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 311.611939][T15711] autofs4:pid:15711:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)}}], 0x2, 0x0, 0x0) 01:21:15 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="f2ffff7f000000007f") 01:21:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 311.936781][T15745] autofs4:pid:15745:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(2147483634.0), cmd(0x0000937e) 01:21:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3a5) 01:21:15 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000), 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 312.018641][T15745] autofs4:pid:15745:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)}}], 0x2, 0x0, 0x0) 01:21:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:16 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="f8ffff7f000000007f") 01:21:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x4}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:16 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:16 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)}}], 0x2, 0x0, 0x0) [ 312.405284][T15774] autofs4:pid:15774:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(2147483640.0), cmd(0x0000937e) 01:21:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3a6) 01:21:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x7}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 312.532797][T15774] autofs4:pid:15774:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:16 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:16 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="f9ffff7f000000007f") 01:21:16 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 01:21:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x38}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 312.807461][T15802] autofs4:pid:15802:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(2147483641.0), cmd(0x0000937e) 01:21:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3b1) 01:21:16 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 312.960495][T15802] autofs4:pid:15802:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 01:21:16 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:16 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="1fffffff000000007f") 01:21:16 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x3c8}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 313.279485][T15833] autofs4:pid:15833:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(4294967071.0), cmd(0x0000937e) 01:21:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3b2) 01:21:17 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x2, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 313.321027][T15833] autofs4:pid:15833:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:17 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="010000000000000017") 01:21:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x700}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x1, 0x0, 0x0) 01:21:17 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3b3) 01:21:17 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x4, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x3800}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:17 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="010000000000000018") 01:21:17 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x4000, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x1, 0x0, 0x0) 01:21:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3c5) 01:21:17 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="010000000000001018") 01:21:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x4000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:17 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0xff03, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:17 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x1, 0x0, 0x0) [ 314.315882][T15899] autofs4:pid:15899:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.268435456), cmd(0x0000937e) 01:21:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0xc803}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x34000, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 314.376770][T15899] autofs4:pid:15899:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3c8) 01:21:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:18 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000002000023f") 01:21:18 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x40000, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x40000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 314.720888][T15926] autofs4:pid:15926:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.33562624), cmd(0x0000937e) [ 314.834055][T15926] autofs4:pid:15926:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x400300, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x2000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3d1) 01:21:18 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01020000000000007f") 01:21:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x1000000, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x7000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 315.236528][T15955] autofs4:pid:15955:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(513.0), cmd(0x0000937e) 01:21:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3d4) [ 315.390802][T15955] autofs4:pid:15955:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:19 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x2000000, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x40000000, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:19 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01030000000000007f") 01:21:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x38000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 315.603224][T15976] fuse: Bad value for 'fd' [ 315.694589][T15984] autofs4:pid:15984:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(769.0), cmd(0x0000937e) 01:21:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3db) 01:21:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0xeffdffff, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 315.803674][T15984] autofs4:pid:15984:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x40000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:19 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01040000000000007f") 01:21:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0xff030000, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:19 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) [ 316.131384][T16017] autofs4:pid:16017:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1025.0), cmd(0x0000937e) 01:21:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3dc) 01:21:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0xfffffdef, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x8dffffff}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 316.201859][T16017] autofs4:pid:16017:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:20 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01050000000000007f") 01:21:20 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x4000000000000, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3e0) 01:21:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0xc8030000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 316.520962][T16042] autofs4:pid:16042:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1281.0), cmd(0x0000937e) 01:21:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) [ 316.621799][T16042] autofs4:pid:16042:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0xf0ffffff}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x40030000000000, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:20 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01060000000000007f") 01:21:20 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3e3) 01:21:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0xffffff8d}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 317.035048][T16076] autofs4:pid:16076:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1537.0), cmd(0x0000937e) 01:21:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x100000000000000, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0xfffffff0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 317.166493][T16076] autofs4:pid:16076:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:21 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/172, 0xac}], 0x1}}], 0x2, 0x0, 0x0) 01:21:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3e4) 01:21:21 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01070000000000007f") 01:21:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x200000000000000, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:21 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{0x0}]) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, 0x0) [ 317.462551][T16103] autofs4:pid:16103:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1793.0), cmd(0x0000937e) 01:21:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x4000000000000000, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x4000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 317.571927][T16103] autofs4:pid:16103:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:21 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3ef) 01:21:21 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01080000000000007f") 01:21:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0xeffdffff00000000, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x200000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 317.919005][T16136] autofs4:pid:16136:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(2049.0), cmd(0x0000937e) 01:21:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3f0) [ 318.009161][T16136] autofs4:pid:16136:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0xff03000000000000, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 318.083691][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 318.083705][ T27] audit: type=1800 audit(1563758481.859:31): pid=16117 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16753 res=0 01:21:21 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{0x0}]) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, 0x0) 01:21:21 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01480000000000007f") 01:21:22 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x700000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 318.418380][T16172] autofs4:pid:16172:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(18433.0), cmd(0x0000937e) 01:21:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0xf, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x3f1) [ 318.459516][T16172] autofs4:pid:16172:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:22 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:22 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="014c0000000000007f") 01:21:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x3800000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x24, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x402) [ 318.789477][T16191] autofs4:pid:16191:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(19457.0), cmd(0x0000937e) 01:21:22 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 318.827073][T16191] autofs4:pid:16191:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:22 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{0x0}]) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, 0x0) 01:21:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x4000000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x30, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:22 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01600000000000007f") 01:21:22 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, 0x0, 0x0) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x200c3020, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x8dffffff00000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 319.228753][T16217] autofs4:pid:16217:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(24577.0), cmd(0x0000937e) 01:21:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x40b) [ 319.352106][T16217] autofs4:pid:16217:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x5, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0xc803000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:23 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, 0x0, 0x0) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:23 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01680000000000007f") [ 319.695701][T16249] autofs4:pid:16249:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(26625.0), cmd(0x0000937e) 01:21:23 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{0x0}]) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, 0x0) 01:21:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x6, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x40e) 01:21:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0xf0ffffff00000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 319.827823][T16249] autofs4:pid:16249:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:23 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, 0x0, 0x0) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x7, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:23 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="016c0000000000007f") 01:21:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x414) 01:21:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x8, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:24 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 320.196835][T16283] autofs4:pid:16283:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(27649.0), cmd(0x0000937e) [ 320.231761][T16283] autofs4:pid:16283:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:24 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01740000000000007f") 01:21:24 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{0x0}]) 01:21:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0xa, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x415) 01:21:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x4}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:24 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 320.621466][T16307] autofs4:pid:16307:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(29697.0), cmd(0x0000937e) [ 320.691612][T16307] autofs4:pid:16307:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:24 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="017a0000000000007f") 01:21:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x2, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x7}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x38}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 320.936884][T16335] autofs4:pid:16335:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(31233.0), cmd(0x0000937e) 01:21:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x419) 01:21:24 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x4, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 321.039839][T16335] autofs4:pid:16335:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:24 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 01:21:25 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000300000000007f") 01:21:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x4000, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:25 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r3 = dup(r2) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 01:21:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x3c8}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x41c) [ 321.409675][T16360] autofs4:pid:16360:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(196609.0), cmd(0x0000937e) [ 321.505414][T16360] autofs4:pid:16360:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:25 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0xff03, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x700}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:25 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000500000000007f") 01:21:25 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:25 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r3 = dup(r2) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 01:21:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x41d) 01:21:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x34000, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x3800}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 321.883716][T16391] autofs4:pid:16391:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(327681.0), cmd(0x0000937e) [ 321.921609][T16391] autofs4:pid:16391:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:25 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:25 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000600000000007f") 01:21:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x40000, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x423) 01:21:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x4000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 322.250369][T16417] autofs4:pid:16417:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(393217.0), cmd(0x0000937e) 01:21:26 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r3 = dup(r2) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 01:21:26 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 322.390421][T16417] autofs4:pid:16417:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x400300, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0xc803}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:26 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000700000000007f") 01:21:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x424) 01:21:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x1000000, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 322.696955][T16446] autofs4:pid:16446:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(458753.0), cmd(0x0000937e) 01:21:26 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:26 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x40000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 322.782175][T16446] autofs4:pid:16446:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:26 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01002000000000007f") 01:21:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x2000000, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x42b) 01:21:26 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x2000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x40000000, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 323.134119][T16476] autofs4:pid:16476:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(2097153.0), cmd(0x0000937e) 01:21:27 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:27 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 323.236711][T16476] autofs4:pid:16476:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x42c) 01:21:27 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01004000000000007f") 01:21:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x7000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0xeffdffff, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:27 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 323.577379][T16504] autofs4:pid:16504:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(4194305.0), cmd(0x0000937e) 01:21:27 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 323.630918][T16504] autofs4:pid:16504:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0xff030000, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x38000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:27 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01004800000000007f") 01:21:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x436) 01:21:27 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x40000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:27 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0xfffffdef, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 323.939995][T16528] autofs4:pid:16528:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(4718593.0), cmd(0x0000937e) [ 324.051827][T16528] autofs4:pid:16528:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:27 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01004c00000000007f") 01:21:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x4000000000000, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:28 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:28 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x437) [ 324.265498][T16549] autofs4:pid:16549:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(4980737.0), cmd(0x0000937e) 01:21:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x8dffffff}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 324.390247][T16549] autofs4:pid:16549:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:28 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01006000000000007f") 01:21:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x40030000000000, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:28 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0xc8030000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 324.651688][T16573] autofs4:pid:16573:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(6291457.0), cmd(0x0000937e) 01:21:28 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 324.743951][T16573] autofs4:pid:16573:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x43e) 01:21:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x100000000000000, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:28 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0xfffffeff000) 01:21:28 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01006800000000007f") 01:21:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0xf0ffffff}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:28 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0xfffffeff000) 01:21:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x200000000000000, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:28 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 325.070458][T16602] autofs4:pid:16602:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(6815745.0), cmd(0x0000937e) [ 325.112784][T16602] autofs4:pid:16602:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0xffffff8d}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x44d) 01:21:29 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0xfffffeff000) 01:21:29 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01006c00000000007f") 01:21:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x4000000000000000, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0xfffffff0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 325.403786][T16623] autofs4:pid:16623:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(7077889.0), cmd(0x0000937e) 01:21:29 executing program 2: r0 = open(0x0, 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0xeffdffff00000000, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 325.546408][T16623] autofs4:pid:16623:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:29 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01007400000000007f") 01:21:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x4000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:29 executing program 2: r0 = open(0x0, 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:29 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x44e) 01:21:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0xff03000000000000, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 325.870061][T16647] autofs4:pid:16647:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(7602177.0), cmd(0x0000937e) [ 325.967292][T16647] autofs4:pid:16647:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:29 executing program 2: r0 = open(0x0, 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x200000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:29 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01007a00000000007f") 01:21:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x2}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:30 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x459) 01:21:30 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 326.283929][T16675] autofs4:pid:16675:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(7995393.0), cmd(0x0000937e) [ 326.385566][T16675] autofs4:pid:16675:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:30 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x700000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:30 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="0100ff00000000007f") 01:21:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x4}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:30 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:30 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 326.656829][T16701] autofs4:pid:16701:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(16711681.0), cmd(0x0000937e) 01:21:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x45a) 01:21:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x3800000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 326.735656][T16701] autofs4:pid:16701:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:30 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000010000007f") 01:21:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x4000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:30 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:30 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x4000000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 327.043478][T16721] autofs4:pid:16721:validate_dev_ioctl: invalid path supplied for cmd(0x0000937e) 01:21:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x45b) 01:21:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0xff03}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:30 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000020000007f") 01:21:31 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:31 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x8dffffff00000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:31 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x34000}}], 0x20}], 0x4924924924924d0, 0x0) [ 327.457123][T16755] autofs4:pid:16755:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.2), cmd(0x0000937e) 01:21:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x469) [ 327.522189][T16755] autofs4:pid:16755:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:31 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:31 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000030000007f") 01:21:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0xc803000000000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:31 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x46c) 01:21:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x40000}}], 0x20}], 0x4924924924924d0, 0x0) [ 327.919073][T16780] autofs4:pid:16780:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.3), cmd(0x0000937e) 01:21:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0xf0ffffff00000000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 327.991134][T16780] autofs4:pid:16780:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:31 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:31 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x400300}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:31 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000040000007f") 01:21:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x475) 01:21:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 328.310430][T16808] autofs4:pid:16808:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.4), cmd(0x0000937e) 01:21:32 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:32 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:32 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x1000000}}], 0x20}], 0x4924924924924d0, 0x0) [ 328.400943][T16808] autofs4:pid:16808:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:32 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000050000007f") 01:21:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x478) 01:21:32 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x2000000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:32 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 328.681263][T16834] autofs4:pid:16834:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.5), cmd(0x0000937e) [ 328.715334][T16834] autofs4:pid:16834:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:32 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:32 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000060000007f") 01:21:32 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x40000000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:32 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x47e) 01:21:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 329.105934][T16860] autofs4:pid:16860:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.6), cmd(0x0000937e) 01:21:32 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0xeffdffff}}], 0x20}], 0x4924924924924d0, 0x0) [ 329.197121][T16860] autofs4:pid:16860:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:33 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:33 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000070000007f") 01:21:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x47f) 01:21:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0xff030000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:33 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:33 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 329.545671][T16892] autofs4:pid:16892:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.7), cmd(0x0000937e) [ 329.661657][T16892] autofs4:pid:16892:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0xfffffdef}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:33 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000080000007f") 01:21:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x483) 01:21:33 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:33 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 329.881914][T16911] autofs4:pid:16911:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.8), cmd(0x0000937e) 01:21:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x4000000000000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 330.078259][T16911] autofs4:pid:16911:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:33 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x486) 01:21:34 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:34 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000200000007f") 01:21:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x40030000000000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:34 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 330.586046][T16961] autofs4:pid:16961:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.32), cmd(0x0000937e) 01:21:34 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x100000000000000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x487) [ 330.749591][T16961] autofs4:pid:16961:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:34 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000400000007f") 01:21:34 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x200000000000000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:34 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x4000000000000000}}], 0x20}], 0x4924924924924d0, 0x0) [ 331.183023][T16985] autofs4:pid:16985:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.64), cmd(0x0000937e) 01:21:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x48e) 01:21:35 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 331.227611][T16985] autofs4:pid:16985:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:35 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000480000007f") 01:21:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0xeffdffff00000000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:35 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x48f) [ 331.578000][T17009] autofs4:pid:17009:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.72), cmd(0x0000937e) 01:21:35 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0xff03000000000000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 331.791584][T17009] autofs4:pid:17009:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:35 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:35 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="010000004c0000007f") 01:21:35 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x496) 01:21:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0x2}}], 0x20}], 0x4924924924924d0, 0x0) [ 332.154653][T17050] autofs4:pid:17050:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.76), cmd(0x0000937e) 01:21:36 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:36 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0x4}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 332.210253][T17050] autofs4:pid:17050:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:36 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000600000007f") 01:21:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x497) 01:21:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0x4000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:36 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:36 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(0x0, 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 332.569810][T17077] autofs4:pid:17077:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.96), cmd(0x0000937e) 01:21:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0xff03}}], 0x20}], 0x4924924924924d0, 0x0) [ 332.645771][T17077] autofs4:pid:17077:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x49e) 01:21:36 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000680000007f") 01:21:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:36 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(0x0, 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:36 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0x34000}}], 0x20}], 0x4924924924924d0, 0x0) [ 332.985049][T17106] autofs4:pid:17106:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.104), cmd(0x0000937e) 01:21:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x49f) [ 333.090067][T17106] autofs4:pid:17106:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:36 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(0x0, 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:36 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:37 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="010000006c0000007f") 01:21:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0x40000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x4a7) [ 333.419466][T17135] autofs4:pid:17135:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.108), cmd(0x0000937e) 01:21:37 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:37 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 333.472734][T17135] autofs4:pid:17135:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0x400300}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:37 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000740000007f") 01:21:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 333.751052][ T27] audit: type=1804 audit(1563758497.519:32): pid=17150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir064825978/syzkaller.RplxUJ/266/bus" dev="sda1" ino=17323 res=1 01:21:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0x1000000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:37 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x4a8) [ 333.845800][T17162] autofs4:pid:17162:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.116), cmd(0x0000937e) 01:21:37 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 333.895780][T17162] autofs4:pid:17162:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:37 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="010000007a0000007f") 01:21:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 334.086572][ T27] audit: type=1804 audit(1563758497.859:33): pid=17172 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir064825978/syzkaller.RplxUJ/267/bus" dev="sda1" ino=17321 res=1 01:21:37 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0x2000000}}], 0x20}], 0x4924924924924d0, 0x0) [ 334.194750][T17184] autofs4:pid:17184:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.122), cmd(0x0000937e) 01:21:38 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 334.329856][T17184] autofs4:pid:17184:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x500) [ 334.413305][ T27] audit: type=1804 audit(1563758498.179:34): pid=17193 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir064825978/syzkaller.RplxUJ/268/bus" dev="sda1" ino=17331 res=1 01:21:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0x40000000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:38 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000ff0000007f") 01:21:38 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:38 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 334.637358][T17212] autofs4:pid:17212:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.255), cmd(0x0000937e) 01:21:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0xeffdffff}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 334.734861][T17212] autofs4:pid:17212:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x600) 01:21:38 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="0100000000000000ff") 01:21:38 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0xff030000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:38 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 335.051455][T17241] autofs4:pid:17241:validate_dev_ioctl: invalid path supplied for cmd(0x0000937e) 01:21:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x700) 01:21:38 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000200000000007f") 01:21:39 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0xfffffeff000) 01:21:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0xfffffdef}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:39 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 335.349724][T17256] autofs4:pid:17256:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(131073.0), cmd(0x0000937e) 01:21:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 335.439902][T17256] autofs4:pid:17256:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0x4000000000000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:39 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0xfffffeff000) 01:21:39 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x900) 01:21:39 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000300000000007f") 01:21:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0x40030000000000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:39 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0xfffffeff000) [ 335.828734][T17287] autofs4:pid:17287:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(196609.0), cmd(0x0000937e) [ 335.936935][T17287] autofs4:pid:17287:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0x100000000000000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0xa00) 01:21:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:39 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000400000000007f") 01:21:39 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:39 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xfffffeff000) 01:21:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0x200000000000000}}], 0x20}], 0x4924924924924d0, 0x0) [ 336.247461][T17318] fuse: Bad value for 'fd' [ 336.290871][T17322] autofs4:pid:17322:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(262145.0), cmd(0x0000937e) [ 336.346501][T17322] autofs4:pid:17322:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x2}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:40 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 01:21:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0x4000000000000000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:40 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000500000000007f") 01:21:40 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0xb00) 01:21:40 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xfffffeff000) [ 336.706582][T17347] autofs4:pid:17347:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(327681.0), cmd(0x0000937e) 01:21:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0xeffdffff00000000}}], 0x20}], 0x4924924924924d0, 0x0) [ 336.771209][T17347] autofs4:pid:17347:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x4}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:40 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(0xffffffffffffffff, r5, 0x0, 0x8000fffffffe) 01:21:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241, 0x0, 0xff03000000000000}}], 0x20}], 0x4924924924924d0, 0x0) 01:21:40 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0xc00) 01:21:40 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000600000000007f") 01:21:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x7}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0xf}], 0x4924924924924d0, 0x0) [ 337.236837][T17377] autofs4:pid:17377:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(393217.0), cmd(0x0000937e) [ 337.289220][T17377] autofs4:pid:17377:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:41 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xfffffeff000) 01:21:41 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(0xffffffffffffffff, r5, 0x0, 0x8000fffffffe) 01:21:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x38}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:41 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000700000000007f") 01:21:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0xd00) 01:21:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x24}], 0x4924924924924d0, 0x0) 01:21:41 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0x0) [ 337.652285][T17400] autofs4:pid:17400:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(458753.0), cmd(0x0000937e) 01:21:41 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(0xffffffffffffffff, r5, 0x0, 0x8000fffffffe) 01:21:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x3c8}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 337.737177][T17400] autofs4:pid:17400:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:41 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000800000000007f") 01:21:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0xe00) 01:21:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x30}], 0x4924924924924d0, 0x0) 01:21:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x700}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:41 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0x0) 01:21:41 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, 0xffffffffffffffff, 0x0, 0x8000fffffffe) [ 338.142398][T17430] autofs4:pid:17430:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(524289.0), cmd(0x0000937e) 01:21:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x200c3020}], 0x4924924924924d0, 0x0) 01:21:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x3800}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0xf00) [ 338.191242][T17430] autofs4:pid:17430:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:42 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0x0) 01:21:42 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01004800000000007f") 01:21:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x2}], 0x4924924924924d0, 0x0) 01:21:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x4000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:42 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, 0xffffffffffffffff, 0x0, 0x8000fffffffe) [ 338.518436][T17456] autofs4:pid:17456:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(4718593.0), cmd(0x0000937e) 01:21:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x4}], 0x4924924924924d0, 0x0) 01:21:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0xc803}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x100000800000000c, 0x0, &(0x7f0000000040)) 01:21:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1002) [ 338.675464][T17456] autofs4:pid:17456:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:42 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01004c00000000007f") 01:21:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x4000}], 0x4924924924924d0, 0x0) 01:21:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x40000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:42 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 01:21:42 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) socket$kcm(0x10, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x52) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x2, 0x0, 0x1a) 01:21:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1003) [ 339.025880][T17490] autofs4:pid:17490:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(4980737.0), cmd(0x0000937e) [ 339.123865][T17490] autofs4:pid:17490:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:43 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01006000000000007f") 01:21:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x2000000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0xff03}], 0x4924924924924d0, 0x0) [ 339.279470][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:21:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1004) 01:21:43 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x0) [ 339.442360][T17522] autofs4:pid:17522:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(6291457.0), cmd(0x0000937e) 01:21:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x34000}], 0x4924924924924d0, 0x0) 01:21:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x7000000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 339.564927][T17522] autofs4:pid:17522:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:43 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01006800000000007f") 01:21:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x40000}], 0x4924924924924d0, 0x0) 01:21:43 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x0) [ 339.910796][T17549] autofs4:pid:17549:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(6815745.0), cmd(0x0000937e) [ 340.034189][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 340.069193][T17549] autofs4:pid:17549:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:21:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x38000000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1005) 01:21:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x400300}], 0x4924924924924d0, 0x0) 01:21:43 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x1a, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000280)) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x1}}}, 0x18) semget(0x3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000680)) getuid() lstat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="20002dbf7000fddbdf2501000000000000000741110000234d6e645f7368c201"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x20000804) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x0) 01:21:43 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01006c00000000007f") [ 340.293082][T17573] autofs4:pid:17573:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(7077889.0), cmd(0x0000937e) 01:21:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x1000000}], 0x4924924924924d0, 0x0) [ 340.352545][T17573] autofs4:pid:17573:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000340)={0x1, {{0x2, 0x0, @multicast2=0xe0000004}}}, 0x8c) 01:21:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x40000000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1006) 01:21:44 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01007400000000007f") 01:21:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x2b, &(0x7f0000000340)={0x0, {{0x2, 0x0, @multicast2}}}, 0x8c) 01:21:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x5011, r0, 0xfffffffffffffffd) 01:21:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x2000000}], 0x4924924924924d0, 0x0) 01:21:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x8dffffff}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 340.668249][T17595] autofs4:pid:17595:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(7602177.0), cmd(0x0000937e) [ 340.791617][T17595] autofs4:pid:17595:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1007) 01:21:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100)=0x3, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000003040)='ip6tnl0\x00', 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) 01:21:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x40000000}], 0x4924924924924d0, 0x0) 01:21:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0xc8030000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:44 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x3, 0x40000) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000280)) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)=0x2) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[@ANYBLOB='-pids'], 0x5) 01:21:44 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01007a00000000007f") [ 341.138142][T17627] autofs4:pid:17627:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(7995393.0), cmd(0x0000937e) 01:21:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1008) 01:21:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0xf0ffffff}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 341.212354][T17627] autofs4:pid:17627:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0xeffdffff}], 0x4924924924924d0, 0x0) 01:21:45 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000003000000007f") 01:21:45 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x3, 0x40000) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000280)) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)=0x2) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[@ANYBLOB='-pids'], 0x5) [ 341.454581][T17644] autofs4:pid:17644:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(50331649.0), cmd(0x0000937e) 01:21:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x100a) [ 341.501628][T17644] autofs4:pid:17644:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0xff030000}], 0x4924924924924d0, 0x0) 01:21:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100)=0x3, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000003040)='ip6tnl0\x00', 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) 01:21:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0xffffff8d}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:45 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:45 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000005000000007f") 01:21:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0xfffffdef}], 0x4924924924924d0, 0x0) 01:21:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1012) [ 342.004065][T17672] autofs4:pid:17672:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(83886081.0), cmd(0x0000937e) 01:21:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0xfffffff0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x4000000000000}], 0x4924924924924d0, 0x0) [ 342.107967][T17672] autofs4:pid:17672:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x102d) 01:21:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x4000000000000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:46 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000006000000007f") 01:21:46 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100)=0x3, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000003040)='ip6tnl0\x00', 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) 01:21:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x40030000000000}], 0x4924924924924d0, 0x0) [ 342.413290][T17698] autofs4:pid:17698:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(100663297.0), cmd(0x0000937e) 01:21:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x200000000000000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 342.521567][T17698] autofs4:pid:17698:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1048) 01:21:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x100000000000000}], 0x4924924924924d0, 0x0) 01:21:46 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000007000000007f") 01:21:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x700000000000000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:46 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x200000000000000}], 0x4924924924924d0, 0x0) [ 342.828707][T17723] autofs4:pid:17723:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(117440513.0), cmd(0x0000937e) [ 342.931814][T17723] autofs4:pid:17723:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:46 executing program 2: socket$tipc(0x1e, 0x5, 0x0) r0 = getpid() r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x400000) write$P9_RRENAME(r1, &(0x7f0000000200)={0x7}, 0x7) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001240)='/dev/vga_arbiter\x00', 0x30001, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001280)='/dev/sequencer2\x00', 0x3c081, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0x0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000e40)='security.capability\x00'}, 0x30) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x1) sendto$inet(0xffffffffffffffff, &(0x7f0000000540)="0d000000000000001ec53a2ae3928a31eb4a2ee6b4464dc20fbe43fe306dae5456de96e8176b10e4fc8ee97954b33dda0485fd72ebba9e1f4f9d3335da068c0d4dbfa517611630445f0cbd7ff567274771d7a86b5785028faa1a814efd6383b218c1d41983ea72d3d24c102ecec8047642a40e52cfbb8e80460e4065a76b69bf4252aa82c5bbc36d736924579dad3d620447bf159e18a0f6eba5", 0x9a, 0x40000, 0x0, 0x0) ptrace$setsig(0x4203, r3, 0x3, &(0x7f0000000080)={0x7, 0x6ba0, 0x3eefdd81}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000f40)) connect$tipc(r2, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) 01:21:46 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000020000000007f") 01:21:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x3800000000000000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x104c) 01:21:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x4000000000000000}], 0x4924924924924d0, 0x0) [ 343.176017][T17743] autofs4:pid:17743:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(536870913.0), cmd(0x0000937e) 01:21:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0xeffdffff00000000}], 0x4924924924924d0, 0x0) [ 343.251839][T17743] autofs4:pid:17743:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:47 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x4000000000000000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:47 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000040000000007f") 01:21:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1068) 01:21:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0xff03000000000000}], 0x4924924924924d0, 0x0) [ 343.573366][T17772] autofs4:pid:17772:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1073741825.0), cmd(0x0000937e) 01:21:47 executing program 2: socket$tipc(0x1e, 0x5, 0x0) r0 = getpid() r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x400000) write$P9_RRENAME(r1, &(0x7f0000000200)={0x7}, 0x7) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001240)='/dev/vga_arbiter\x00', 0x30001, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001280)='/dev/sequencer2\x00', 0x3c081, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0x0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000e40)='security.capability\x00'}, 0x30) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x1) sendto$inet(0xffffffffffffffff, &(0x7f0000000540)="0d000000000000001ec53a2ae3928a31eb4a2ee6b4464dc20fbe43fe306dae5456de96e8176b10e4fc8ee97954b33dda0485fd72ebba9e1f4f9d3335da068c0d4dbfa517611630445f0cbd7ff567274771d7a86b5785028faa1a814efd6383b218c1d41983ea72d3d24c102ecec8047642a40e52cfbb8e80460e4065a76b69bf4252aa82c5bbc36d736924579dad3d620447bf159e18a0f6eba5", 0x9a, 0x40000, 0x0, 0x0) ptrace$setsig(0x4203, r3, 0x3, &(0x7f0000000080)={0x7, 0x6ba0, 0x3eefdd81}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000f40)) connect$tipc(r2, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) 01:21:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x8dffffff00000000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) 01:21:47 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x106c) [ 343.792770][T17772] autofs4:pid:17772:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0xc803000000000000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:47 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:47 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000048000000007f") 01:21:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) 01:21:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1074) 01:21:48 executing program 2: socket$tipc(0x1e, 0x5, 0x0) r0 = getpid() r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x400000) write$P9_RRENAME(r1, &(0x7f0000000200)={0x7}, 0x7) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001240)='/dev/vga_arbiter\x00', 0x30001, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001280)='/dev/sequencer2\x00', 0x3c081, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0x0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000e40)='security.capability\x00'}, 0x30) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x1) sendto$inet(0xffffffffffffffff, &(0x7f0000000540)="0d000000000000001ec53a2ae3928a31eb4a2ee6b4464dc20fbe43fe306dae5456de96e8176b10e4fc8ee97954b33dda0485fd72ebba9e1f4f9d3335da068c0d4dbfa517611630445f0cbd7ff567274771d7a86b5785028faa1a814efd6383b218c1d41983ea72d3d24c102ecec8047642a40e52cfbb8e80460e4065a76b69bf4252aa82c5bbc36d736924579dad3d620447bf159e18a0f6eba5", 0x9a, 0x40000, 0x0, 0x0) ptrace$setsig(0x4203, r3, 0x3, &(0x7f0000000080)={0x7, 0x6ba0, 0x3eefdd81}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000f40)) connect$tipc(r2, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10) [ 344.229493][T17814] autofs4:pid:17814:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1207959553.0), cmd(0x0000937e) 01:21:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0xf0ffffff00000000}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:48 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) [ 344.371804][T17814] autofs4:pid:17814:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:48 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="0100004c000000007f") 01:21:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x107a) 01:21:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) 01:21:48 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) [ 344.692042][T17849] autofs4:pid:17849:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1275068417.0), cmd(0x0000937e) 01:21:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd4, &(0x7f0000000100), 0x4) ioctl$KVM_GET_API_VERSION(0xffffffffffffffff, 0xae00, 0x0) 01:21:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:48 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) [ 344.921686][T17849] autofs4:pid:17849:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1100) 01:21:48 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000060000000007f") 01:21:48 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0xfffffeff000) 01:21:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) 01:21:49 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) [ 345.233403][T17887] autofs4:pid:17887:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1610612737.0), cmd(0x0000937e) 01:21:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1200) 01:21:49 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 345.348597][T17887] autofs4:pid:17887:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) 01:21:49 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000000c0)=""/246) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSPASS(r0, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:49 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000068000000007f") 01:21:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x2d00) 01:21:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) [ 345.688749][T17920] autofs4:pid:17920:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1744830465.0), cmd(0x0000937e) 01:21:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:49 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000000c0)=""/246) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSPASS(r0, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x483) [ 345.821869][T17920] autofs4:pid:17920:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) 01:21:49 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="0100006c000000007f") 01:21:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x2f00) 01:21:49 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000000c0)=""/246) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSPASS(r0, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2, 0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) 01:21:50 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) [ 346.189061][T17952] autofs4:pid:17952:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1811939329.0), cmd(0x0000937e) [ 346.251714][T17952] autofs4:pid:17952:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x20001440) 01:21:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) 01:21:50 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:50 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:50 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000074000000007f") 01:21:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) 01:21:50 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0xffff0f00) [ 346.700737][T17987] autofs4:pid:17987:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1946157057.0), cmd(0x0000937e) 01:21:50 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:50 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) [ 346.898600][T17987] autofs4:pid:17987:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:50 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="0100007a000000007f") 01:21:50 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vfio/vfio\x00', 0x800, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x400, 0x2a7, 0x0, 0xfff, 0x0, 0x7, 0x0, 0x2, 0x101, 0x80000001, 0x0, 0x7, 0x8a, 0x4, 0x1f, 0x8, 0x0, 0x5, 0x1, 0x5, 0x1, 0x80000001, 0x71, 0xff, 0x8, 0x9, 0xcdb8, 0x7, 0xffffffff, 0xffff, 0x800, 0x2, 0x10001, 0x8c7c, 0xb1, 0x6, 0x0, 0x9, 0x1, @perf_config_ext={0xfdf}, 0x1000, 0xfffffffffffffffe, 0xcca, 0xb, 0x8001, 0x3ff, 0x4}, r0, 0xffffffffffffffff, r1, 0x2) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000100)=0x94) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(0xffffffffffffffff, &(0x7f0000000440), 0x1000) 01:21:50 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) 01:21:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x459) 01:21:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:51 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) 01:21:51 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="010000ff000000007f") 01:21:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 347.533948][T18048] fuse: Bad value for 'fd' 01:21:51 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000001440)=ANY=[@ANYBLOB="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"]) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x4011, r0, 0x8000000) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) read(r2, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000440), 0x1000) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x400, 0x0) 01:21:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x459) 01:21:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) 01:21:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:51 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000100007f") 01:21:51 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:51 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000200007f") 01:21:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) 01:21:51 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:51 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:52 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000001880)='\x00'}, 0x30) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000001940)='net/udp\x00') truncate(&(0x7f0000000040)='\x00', 0x40) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) msgget(0x0, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f01006da993286fd4d542153030303030307e968da7c550359b303030303030303134303030302c", @ANYRESDEC=0x0, @ANYBLOB=',grop_id=\x00', @ANYRESDEC=0x0, @ANYBLOB="00005291f2bdb42b42bae07226b10769040387f16160bdb073adfc324ad41038f8ebcc9dcbc6653565977d7eeae682cd93c4387ad268d1e0d2f77ebf00e2f44af96ff5fbcda548df01e49d4ea925adc07738df191cfb74fe1fa13f7cacc0053620f79c7bb68199c18df9bdf38957f54cc635ecdd5e8949d867c151c6e9cb7aff26d0fda1abc6b3b80219959168cf27e473c822cf03ab4376c7c59055427be9db7a5982cf75fe5106e81492894aa93858a9d31daf"]) read$FUSE(r1, &(0x7f0000000440), 0x1000) fstat(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) recvfrom$rose(r1, &(0x7f0000001780)=""/132, 0x84, 0x20, &(0x7f0000001840)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @default}, 0x1c) r5 = getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001580)={0x0, 0x0, 0x0}, &(0x7f00000015c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001600)={0x0, 0x0, 0x0}, &(0x7f0000001640)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001680)={0x0, 0x0, 0x0}, &(0x7f00000016c0)=0xc) getgroups(0x9, &(0x7f0000001700)=[r3, r4, r5, r6, r7, r8, r9, r10, r11]) 01:21:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) 01:21:52 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) [ 348.272115][T18092] autofs4:pid:18092:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.512), cmd(0x0000937e) [ 348.308165][T18092] autofs4:pid:18092:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:52 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000300007f") 01:21:52 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) 01:21:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 348.620593][T18124] autofs4:pid:18124:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.768), cmd(0x0000937e) 01:21:52 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pselect6(0x40, &(0x7f0000000100)={0x2, 0x7ff, 0x4a, 0x951e, 0x81, 0x7ff, 0x6, 0xfffffffffffffffa}, &(0x7f0000000140)={0x6ea, 0x80000001, 0x9, 0x1, 0x9, 0x5, 0x1f, 0x8}, &(0x7f0000000180)={0x0, 0xabc, 0x3, 0x1, 0x1, 0x10001, 0xb713}, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000340)={&(0x7f0000000300)={0x7fffffff}, 0x8}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) recvfrom$inet(r0, &(0x7f0000001780)=""/230, 0xe6, 0x121, 0x0, 0xffffffffffffff37) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) read$FUSE(r0, &(0x7f0000000440), 0x1000) time(&(0x7f0000000200)) 01:21:52 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) [ 348.671661][T18124] autofs4:pid:18124:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:52 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:52 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000400007f") 01:21:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:52 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20, 0x0}], 0x4924924924924d0, 0x0) [ 348.862962][T18139] fuse: Unknown parameter 'defaulT_pessions' [ 348.924188][T18144] fuse: Unknown parameter 'defaulT_pessions' 01:21:52 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:21:52 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) r2 = socket$netlink(0x10, 0x3, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x3) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x16}]}, 0x30}}, 0x0) read$FUSE(r0, &(0x7f0000000440), 0x1000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001540)=0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001580)={0x0, 0x0}, &(0x7f00000015c0)=0xc) getgroups(0x4, &(0x7f0000001600)=[0x0, 0xee00, 0xee00, 0x0]) sendmsg$unix(r0, &(0x7f0000001700)={&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000340)="f1136776f39341b2c64904378eb5d474a39e941abbcac4ca3401e5f1e3ea44ba812ec213e5274a671ce2b67eff9c6e8549bfe65861a5674a8885bfd0b0056ba282dc6534b56058c6fec44d78577f32adc12ddce3b5630186bb4cfebe1cf9bc70016e6eb20d3bee4b395afa4ef1fe99a3329066", 0x73}, {&(0x7f0000001440)="3fcea27c1896540d266d9d36d0eb478a219d5c5cf848ca0303c5f53b4df88f6689e8b0449dddc39e2bfda16758ba078af4ab4e6fb2fd2b28bc3cf0ae84aa91cc98be100da3ae9c138a4d8546d442251fdcd470647ea4ad35fab38cf1c1861caeb4a2d308c3a5849356b28fdff5afd3b827ce1dd68e45894a864e8a7b9868c7f9c8749467308e358e5a532c47f542ae8addb4a57d09323c977dba69ecc2fd48beedd44d65e6c94a739cb87e2a1ffd995f3237d6adecc71550a1a4e26ab392076f1ac33e1cd24403ffd5", 0xc9}, {&(0x7f00000003c0)="81aea8f23f6bd16854be032b3967", 0xe}], 0x3, &(0x7f0000001780)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="1c000000000000000115000001000000000000005dbd01cc23b50b6518411b1934c35acabfb71a56fcbc22534ed3bdcf9aaa35dd9699eb898a64f50cf8af20386d186e1f0667dbf98676f73949e575d4bfd832c55b7fbb3a49962a2578ab1a1a31e64cb592b7321a2f165b38729eaed9fdde6e1b124cfd35996c71a7776986528d5b6beb098c9987b16090316754267b8edf07b42fe7a276e18bda718423479cf22950b49f2a7ad3ab5d0e231d90", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0x98}, 0x4) [ 349.033297][T18152] autofs4:pid:18152:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.1024), cmd(0x0000937e) 01:21:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x2) [ 349.122236][T18152] autofs4:pid:18152:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:53 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000500007f") 01:21:53 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) [ 349.351450][T18172] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 01:21:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x4) 01:21:53 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 349.414211][T18178] autofs4:pid:18178:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.1280), cmd(0x0000937e) 01:21:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 349.472849][T18178] autofs4:pid:18178:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x4000) 01:21:53 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000600007f") 01:21:53 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pselect6(0x40, &(0x7f0000000100)={0x2, 0x7ff, 0x4a, 0x951e, 0x81, 0x7ff, 0x6, 0xfffffffffffffffa}, &(0x7f0000000140)={0x6ea, 0x80000001, 0x9, 0x1, 0x9, 0x5, 0x1f, 0x8}, &(0x7f0000000180)={0x0, 0xabc, 0x3, 0x1, 0x1, 0x10001, 0xb713}, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000340)={&(0x7f0000000300)={0x7fffffff}, 0x8}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) recvfrom$inet(r0, &(0x7f0000001780)=""/230, 0xe6, 0x121, 0x0, 0xffffffffffffff37) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) read$FUSE(r0, &(0x7f0000000440), 0x1000) time(&(0x7f0000000200)) [ 349.788895][T18201] autofs4:pid:18201:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.1536), cmd(0x0000937e) [ 349.899977][T18205] fuse: Unknown parameter 'defaulT_pessions' [ 349.941910][T18201] autofs4:pid:18201:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) r2 = open(&(0x7f0000000000)='.\x00', 0x8000, 0x1) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f00000002c0)={'lo\x00', 0x19, 0x100000001}) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:21:53 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:53 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000700007f") 01:21:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0xff03) 01:21:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pselect6(0x40, &(0x7f0000000100)={0x2, 0x7ff, 0x4a, 0x951e, 0x81, 0x7ff, 0x6, 0xfffffffffffffffa}, &(0x7f0000000140)={0x6ea, 0x80000001, 0x9, 0x1, 0x9, 0x5, 0x1f, 0x8}, &(0x7f0000000180)={0x0, 0xabc, 0x3, 0x1, 0x1, 0x10001, 0xb713}, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000340)={&(0x7f0000000300)={0x7fffffff}, 0x8}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) recvfrom$inet(r0, &(0x7f0000001780)=""/230, 0xe6, 0x121, 0x0, 0xffffffffffffff37) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) read$FUSE(r0, &(0x7f0000000440), 0x1000) time(&(0x7f0000000200)) [ 350.035515][T18172] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 350.117882][T18217] autofs4:pid:18217:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.1792), cmd(0x0000937e) [ 350.160003][T18215] fuse: Unknown parameter 'defaulT_pessions' 01:21:54 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pselect6(0x40, &(0x7f0000000100)={0x2, 0x7ff, 0x4a, 0x951e, 0x81, 0x7ff, 0x6, 0xfffffffffffffffa}, &(0x7f0000000140)={0x6ea, 0x80000001, 0x9, 0x1, 0x9, 0x5, 0x1f, 0x8}, &(0x7f0000000180)={0x0, 0xabc, 0x3, 0x1, 0x1, 0x10001, 0xb713}, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000340)={&(0x7f0000000300)={0x7fffffff}, 0x8}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) recvfrom$inet(r0, &(0x7f0000001780)=""/230, 0xe6, 0x121, 0x0, 0xffffffffffffff37) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) read$FUSE(r0, &(0x7f0000000440), 0x1000) time(&(0x7f0000000200)) 01:21:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x34000) [ 350.234906][T18217] autofs4:pid:18217:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:54 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000800007f") 01:21:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001500)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20c00011}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x2, 0x10000, 0x25dfdbfd, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x24}}, 0x80) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000000)={0x80000000, 0x0, 0x10001, 0x6}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000300)={0x0, 0x7c, "e0616f0a09c0906b6c9f5439f9e80f98bedf1c46681fa8f3a14cc50fda46a6727f8171c4cea12cf2e46c2598759540159816a6f23a930732f0795958a6fcbc560ac36e61075c2f98b89015b82629a150ce2ec1ce6e09173cd0f41bfcf86af67ba37a7cfedb7c188b019d0800824a9c8ba14d26d461b12f76c4252572"}, &(0x7f00000003c0)=0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000001440)={r3, @in6={{0xa, 0x4e24, 0x7ed5144a, @remote, 0x100000001}}, 0xd2, 0x7, 0x6, 0x8, 0xc3}, &(0x7f0000000400)=0x98) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:21:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x40000) [ 350.482368][T18240] fuse: Unknown parameter 'defaulT_pessions' [ 350.504548][T18246] autofs4:pid:18246:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.2048), cmd(0x0000937e) 01:21:54 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 350.561637][T18246] autofs4:pid:18246:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pselect6(0x40, &(0x7f0000000100)={0x2, 0x7ff, 0x4a, 0x951e, 0x81, 0x7ff, 0x6, 0xfffffffffffffffa}, &(0x7f0000000140)={0x6ea, 0x80000001, 0x9, 0x1, 0x9, 0x5, 0x1f, 0x8}, &(0x7f0000000180)={0x0, 0xabc, 0x3, 0x1, 0x1, 0x10001, 0xb713}, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000340)={&(0x7f0000000300)={0x7fffffff}, 0x8}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) recvfrom$inet(r0, &(0x7f0000001780)=""/230, 0xe6, 0x121, 0x0, 0xffffffffffffff37) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:21:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x400300) 01:21:54 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000002000007f") 01:21:54 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x62081, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000180)=""/45) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000400)) bpf$PROG_LOAD(0x5, &(0x7f0000001440)={0x0, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5}, [@exit, @jmp={0x5, 0x6, 0x0, 0x7, 0xf, 0xffffffffffffffec, 0xfffffffffffffff0}]}, &(0x7f0000000300)='syzkaller\x00', 0xfffffffffffffffe, 0x1b, &(0x7f0000000340)=""/27, 0x41f00, 0x5, [], 0x0, 0xb, r1, 0x8, &(0x7f0000000380)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x10000, 0x4}, 0x10}, 0x70) read$FUSE(r1, &(0x7f0000000440), 0x1000) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) bind(r2, &(0x7f0000000100)=@hci={0x1f, r3, 0x3}, 0x80) [ 350.797009][T18265] fuse: Unknown parameter 'defaulT_pessions' 01:21:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:54 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x16}]}) 01:21:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pselect6(0x40, &(0x7f0000000100)={0x2, 0x7ff, 0x4a, 0x951e, 0x81, 0x7ff, 0x6, 0xfffffffffffffffa}, &(0x7f0000000140)={0x6ea, 0x80000001, 0x9, 0x1, 0x9, 0x5, 0x1f, 0x8}, &(0x7f0000000180)={0x0, 0xabc, 0x3, 0x1, 0x1, 0x10001, 0xb713}, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000340)={&(0x7f0000000300)={0x7fffffff}, 0x8}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) recvfrom$inet(r0, &(0x7f0000001780)=""/230, 0xe6, 0x121, 0x0, 0xffffffffffffff37) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) [ 350.946019][T18274] autofs4:pid:18274:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.8192), cmd(0x0000937e) 01:21:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x1000000) [ 351.028646][T18274] autofs4:pid:18274:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 351.111223][T18283] fuse: Unknown parameter 'defaulT_pessions' 01:21:54 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000004000007f") 01:21:55 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pselect6(0x40, &(0x7f0000000100)={0x2, 0x7ff, 0x4a, 0x951e, 0x81, 0x7ff, 0x6, 0xfffffffffffffffa}, &(0x7f0000000140)={0x6ea, 0x80000001, 0x9, 0x1, 0x9, 0x5, 0x1f, 0x8}, &(0x7f0000000180)={0x0, 0xabc, 0x3, 0x1, 0x1, 0x10001, 0xb713}, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000340)={&(0x7f0000000300)={0x7fffffff}, 0x8}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:21:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x2000000) 01:21:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67727f7570df69643d", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:21:55 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, 0x0) [ 351.304850][T18296] autofs4:pid:18296:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.16384), cmd(0x0000937e) [ 351.362955][T18296] autofs4:pid:18296:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:55 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000004800007f") [ 351.430702][T18304] fuse: Unknown parameter 'defaulT_pessions' 01:21:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x40000000) 01:21:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:55 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pselect6(0x40, &(0x7f0000000100)={0x2, 0x7ff, 0x4a, 0x951e, 0x81, 0x7ff, 0x6, 0xfffffffffffffffa}, &(0x7f0000000140)={0x6ea, 0x80000001, 0x9, 0x1, 0x9, 0x5, 0x1f, 0x8}, &(0x7f0000000180)={0x0, 0xabc, 0x3, 0x1, 0x1, 0x10001, 0xb713}, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000340)={&(0x7f0000000300)={0x7fffffff}, 0x8}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:21:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 351.598096][T18318] autofs4:pid:18318:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.18432), cmd(0x0000937e) 01:21:55 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, 0x0) [ 351.661893][T18318] autofs4:pid:18318:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0xeffdffff) [ 351.720836][T18329] fuse: Bad value for 'fd' [ 351.774571][T18330] fuse: Bad value for 'fd' 01:21:55 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000004c00007f") 01:21:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:55 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pselect6(0x40, &(0x7f0000000100)={0x2, 0x7ff, 0x4a, 0x951e, 0x81, 0x7ff, 0x6, 0xfffffffffffffffa}, &(0x7f0000000140)={0x6ea, 0x80000001, 0x9, 0x1, 0x9, 0x5, 0x1f, 0x8}, &(0x7f0000000180)={0x0, 0xabc, 0x3, 0x1, 0x1, 0x10001, 0xb713}, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000340)={&(0x7f0000000300)={0x7fffffff}, 0x8}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) [ 351.830191][T18337] fuse: Bad value for 'fd' 01:21:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = fcntl$getown(r0, 0x9) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001440)={0x0, 0x0}, &(0x7f0000001480)=0xc) sendmsg$nl_generic(r0, &(0x7f0000001500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000014c0)={&(0x7f0000001780)={0x1220, 0x4, 0x308, 0x70bd2c, 0x25dfdbfd, {0x1c}, [@nested={0x10e0, 0x11, [@generic="f93375e53929403cd24abe23b0ecf496803d852d321963330b0676dcff4582d1a68644c2a2261074e4fd78e76f1b31d9be7c2f5ddff6d2b01489cc8e243cde542640ee474d6f3859e5e35970aa4a250888aeaa2d0c91532114e4fb0ee3219388693b0af348214faf7673d902b153614c732e93c593173b07d44018c374cad6643077cb961e1d0cbb15aa1e36418dff73c3682d295a30adfc8983c2f65845111a73ae2cca2d533fe90480f184f6abbe5df3cfe17228f1", @typed={0x8, 0x4d, @pid=r1}, @generic="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", @typed={0x8, 0x79, @uid=r2}, @typed={0x14, 0x6a, @ipv6=@rand_addr="cd3071d1db133859a412ebecefb145a0"}]}, @generic="3a057b65e34380c8055099c23f1d65656d11908134138ca6eba280b6167e2ac3e771f059867ba32f241eb7a1bf654c94271662aec948f3a8c11b80e8632a8e8c7a9e62068a7729b59bf158d112e1931626", @typed={0x14, 0x39, @ipv6=@ipv4={[], [], @broadcast}}, @typed={0x8, 0x78, @uid=r3}, @typed={0x8, 0xb, @fd=r0}, @generic="557714f02f82ab9973271bdaeecbfbd15fec73d20768c8bfdd6b096d84da8394d6adbfb9e34ec4882d72ea296efe2776ea9d73def0d73520f10d5c96ba10d0a0e7367278b2915c945d771953aa2f446d7fb97aa9f194c3f666a2d45fa66ee2e668fe7e3ef808145ef5128869c8c0d434181a86d06af67d85ed4b3e3de6b0a4f983e71300e26a57730ffc88dc1121264454e183d59fff961dd93735ca4fc39b89f330b892dc984028256eef94ea0b71b4967e9e6f69e079"]}, 0x1220}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000000)=0x100, 0x4) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) fcntl$getownex(r4, 0x10, &(0x7f0000000040)={0x0, 0x0}) waitid(0x0, r5, &(0x7f0000000100), 0x1, &(0x7f00000002c0)) 01:21:55 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, 0x0) 01:21:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0xff030000) [ 351.929733][T18341] autofs4:pid:18341:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.19456), cmd(0x0000937e) [ 352.014195][T18345] fuse: Bad value for 'fd' 01:21:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:55 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pselect6(0x40, &(0x7f0000000100)={0x2, 0x7ff, 0x4a, 0x951e, 0x81, 0x7ff, 0x6, 0xfffffffffffffffa}, &(0x7f0000000140)={0x6ea, 0x80000001, 0x9, 0x1, 0x9, 0x5, 0x1f, 0x8}, &(0x7f0000000180)={0x0, 0xabc, 0x3, 0x1, 0x1, 0x10001, 0xb713}, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000340)={&(0x7f0000000300)={0x7fffffff}, 0x8}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) [ 352.119334][T18341] autofs4:pid:18341:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:56 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000006000007f") 01:21:56 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x0, 0x0}) [ 352.246142][T18366] fuse: Bad value for 'fd' 01:21:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}, 0x0}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:21:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0xfffffdef) 01:21:56 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pselect6(0x40, &(0x7f0000000100)={0x2, 0x7ff, 0x4a, 0x951e, 0x81, 0x7ff, 0x6, 0xfffffffffffffffa}, &(0x7f0000000140)={0x6ea, 0x80000001, 0x9, 0x1, 0x9, 0x5, 0x1f, 0x8}, &(0x7f0000000180)={0x0, 0xabc, 0x3, 0x1, 0x1, 0x10001, 0xb713}, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000340)={&(0x7f0000000300)={0x7fffffff}, 0x8}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:21:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 352.355445][T18371] autofs4:pid:18371:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.24576), cmd(0x0000937e) [ 352.484012][T18371] autofs4:pid:18371:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 352.499709][T18381] fuse: Unknown parameter 'defaulT_pessions' 01:21:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x2, 0x0}}], 0x2, 0x0, 0x0) 01:21:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x4000000000000) 01:21:56 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x0, 0x0}) 01:21:56 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000006800007f") 01:21:56 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:21:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x2, 0xdf, 0x8000}}, 0x28) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 352.719029][T18397] autofs4:pid:18397:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.26624), cmd(0x0000937e) 01:21:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x40030000000000) 01:21:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x4, 0x0}}], 0x2, 0x0, 0x0) [ 352.817998][T18403] fuse: Unknown parameter 'defaulT_pessions' [ 352.832152][T18397] autofs4:pid:18397:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:56 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000006c00007f") 01:21:56 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:21:56 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x0, 0x0}) 01:21:56 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000040)={0x2d08, 0x48b1}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030322c757365725f69643d45b8be64b40ac8bc0cbb9b73c800f3cc1abab463f6892c30805092e950a7ea866845d385cc0004e0bf6983faae6be654e12900e623f74308ee46a59d9fc7c2b7d08ab9", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) read$FUSE(r1, &(0x7f0000000440), 0x1000) socket$kcm(0x29, 0x2, 0x0) 01:21:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x100000000000000) 01:21:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x7, 0x0}}], 0x2, 0x0, 0x0) [ 353.132884][T18426] autofs4:pid:18426:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.27648), cmd(0x0000937e) [ 353.230170][T18432] fuse: Bad value for 'user_id' 01:21:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x200000000000000) 01:21:57 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x0, &(0x7f0000000200)}) [ 353.251053][T18426] autofs4:pid:18426:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 353.277839][T18437] fuse: Bad value for 'user_id' 01:21:57 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:21:57 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000007400007f") 01:21:57 executing program 0: fcntl$getown(0xffffffffffffff9c, 0x9) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000003c0)='net/nfsfs\x00') openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.opaque\x00', &(0x7f0000000140)='cgroup.events\x00', 0xe, 0x3) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303d0000feffffff0d00000000", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75868720a1be156b6ddfd085520a5415fd705f61643d", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c000000de752849383bead3ab79856a00000000", @ANYRES16=r3, @ANYBLOB="040028bd7000fddbdf25030000000800060002000000140001001adb22701faf0fa9ef41da0a2b0423d40800040006000000140004000300000007000000000800005a980000"], 0x4c}, 0x1, 0x0, 0x0, 0x4810}, 0x8001) socket$bt_bnep(0x1f, 0x3, 0x4) 01:21:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x38, 0x0}}], 0x2, 0x0, 0x0) 01:21:57 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x0, &(0x7f0000000200)}) 01:21:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x4000000000000000) [ 353.523360][T18453] autofs4:pid:18453:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.29696), cmd(0x0000937e) 01:21:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x3c8, 0x0}}], 0x2, 0x0, 0x0) 01:21:57 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:21:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) r2 = getgid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) r3 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x40008, &(0x7f0000001880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000001}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@seclabel='seclabel'}, {@euid_lt={'euid<', r3}}, {@euid_lt={'euid<', r4}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<', r6}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 353.669567][T18453] autofs4:pid:18453:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:57 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000007a00007f") 01:21:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0xeffdffff00000000) 01:21:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x700, 0x0}}], 0x2, 0x0, 0x0) [ 353.828720][T18480] fuse: Unknown parameter 'obj_role' [ 353.840976][T18480] fuse: Unknown parameter 'obj_role' 01:21:57 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x0, &(0x7f0000000200)}) 01:21:57 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) [ 353.906227][T18484] autofs4:pid:18484:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.31232), cmd(0x0000937e) [ 353.981859][T18484] autofs4:pid:18484:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c00000000726d28d34f29ef6e732c00"]) accept4$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @loopback, @local}, &(0x7f00000003c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001440)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000001700)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000016c0)={&(0x7f0000001540)=@acquire={0x154, 0x17, 0x500, 0x70bd2c, 0x25dfdbfe, {{@in=@multicast1, 0x4d5, 0x33}, @in=@broadcast, {@in6=@remote, @in=@broadcast, 0x4e22, 0xdd, 0x4e21, 0x0, 0xa, 0xa0, 0x80, 0x6, r2, r3}, {{@in6=@local, @in6=@loopback, 0x4e23, 0x2f33db2f, 0x4e20, 0xc3aa, 0x0, 0xa0, 0x20, 0x32, r4, r5}, {0x5, 0x7f000000000000, 0xa7, 0xbe83, 0xfff, 0x16, 0x7, 0x3}, {0x3328, 0x9, 0x0, 0x9}, 0xd47, 0x6e6bba, 0x0, 0x0, 0x0, 0x3}, 0x7, 0x5, 0x80, 0x70bd25}, [@ipv6_hthresh={0x8, 0x4, {0x11, 0x56}}, @ipv4_hthresh={0x8, 0x3, {0x10, 0x4}}, @encap={0x1c, 0x4, {0xfffffffffffffffe, 0x4e24, 0x4e23, @in=@dev={0xac, 0x14, 0x14, 0x2b}}}]}, 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x40) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:21:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0xff03000000000000) 01:21:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x3800, 0x0}}], 0x2, 0x0, 0x0) 01:21:57 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="0100000000ff00007f") 01:21:57 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:21:57 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) [ 354.221221][T18504] fuse: Unknown parameter 'defaul' [ 354.316685][T18513] fuse: Unknown parameter 'defaul' 01:21:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0xffffffffffffffff, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="2000000000000000840000004102000500"/28, @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000040)={0x0, 0xcb, 0x7fff, &(0x7f0000000000)=0x1}) prctl$PR_SET_THP_DISABLE(0x29, 0x1) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000140), &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e22, @loopback}}, [0xffffffff, 0x1, 0x0, 0x3, 0x1b, 0x3, 0xffffffff00000001, 0xfffffffffffffe01, 0x100, 0x6, 0xea44, 0x7, 0x1, 0x7, 0x10000]}, &(0x7f0000000300)=0x100) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e24, 0x4000000000000000, @mcast1, 0xffffffff}}}, 0x84) 01:21:58 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:21:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) [ 354.384870][T18521] autofs4:pid:18521:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.65280), cmd(0x0000937e) 01:21:58 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:21:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x4000, 0x0}}], 0x2, 0x0, 0x0) [ 354.491363][T18521] autofs4:pid:18521:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:58 executing program 5: r0 = accept4(0xffffffffffffff9c, &(0x7f00000001c0)=@tipc, &(0x7f0000000040)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0x66, "46c8889f96e59c718477f0b7fd5a209509eac534c903440d2d75f323cb49d3a8428965363cfd217130d0ae79fc213556f79121ceb92ad840687472b6a1316c6bfaafa643f540cb38bcdf02e1c79dd1b594f91f140c198ec795628e6c28cf28660931e317b664"}, &(0x7f0000000140)=0x6e) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r1, 0x1ff, 0x9}, &(0x7f0000000300)=0x8) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x404480, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000380)=r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r3, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="200002004c20ffdd00"/18, @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40000, 0x0) 01:21:58 executing program 2: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:21:58 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000002000000007f") 01:21:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x7) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000000)={0x3c5, 0x8000, [0x6, 0x6, 0x5, 0x2, 0xfff], 0x101}) 01:21:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000084000000050000002067e3d9654740f3"], 0x18}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000240)=r1) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0x438b, 0x4) 01:21:58 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) [ 354.860926][T18549] autofs4:pid:18549:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(33554433.0), cmd(0x0000937e) 01:21:58 executing program 2: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:21:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0xc803, 0x0}}], 0x2, 0x0, 0x0) [ 354.988138][T18549] autofs4:pid:18549:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x401, 0x800) r2 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f00000001c0)={{0x1, 0x5, 0x7fffffff, 0x0, '\x00', 0x800}, 0x4, 0x20000003, 0x2, r2, 0x6, 0x9, 'syz1\x00', &(0x7f0000000040)=['/procppp0\x00', '$\'/vboxnet1\x00', '\x00', 'self\x00', '\x00', '\x00'], 0x1e, [], [0x9f7, 0x7ff, 0xffffffffffffff7f, 0xfe]}) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x20) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000000300)="24340af2d1b6da0db2406c454c62bdd59dfb07d323fe704759e5c410011597f275972e20120ea13a588cf9ef055146c923f444abaea8e8be607c3eda87bc310dc98d31530536cc5049d1c29c2e882e062d817743ef771e54d8e95e42b22ab71fcf33fb2a6cbca70b38608eb04f5401ce1ccf3d878312f20e5051369f57278182181918684de35d330ed707c326c31e4696c77b003d3a6ce3564c38790152a3600c90123c76b5f402d21430c7485ca99a568cd013cd3b902ca3b4eaf8d78ac569f4b37fa64caf14") 01:21:58 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000003000000007f") 01:21:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mo1\tUfZ#\x83\xba') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000001640)={0x0, 0x9}, &(0x7f0000001680)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000016c0)={0x4, 0xa4, 0x200, 0x8000, 0x7, 0x401, 0x1, 0xfff, r1}, &(0x7f0000001700)=0x20) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',defaultU37emissions,\x00']) read$FUSE(r0, &(0x7f0000000440), 0x1000) r3 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="4e8c000eb460b56b9eb7f3d9742e62c61783a678a9018ec9bf13bd34754150ac31cd3342f6233c2957f6d41a7c2303a6567df1e5857ed425710e3925bd5f112f1cc0358f9c0b6803c7ec5ec13382c09544df2129a72bbe26663ff3f4c6", 0x5d, 0xfffffffffffffff8) r4 = add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="c86599312006700256c4fbf11cb73c52a9554cd902b6976d514924c42a4e123fa1aa4b3e33e377d50f4ab60ff67904be926f012cc2615c1182433c29f358a8bccafe51b0dd139883f55963047ae47ee89a0f90eb54ef9ca13539779a124cd75931da86d3666594a57e70948f57f452b0d06f0918629baa9faa817fd2f370daa6635b16e399ad1b4a31c9b44650a7c333b3693d3b8185c2be5dfb8e9e24a9eed7f8afe3571b34e6c0a918d13fa617e22ccb20ff631c0c93b0", 0xb8, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001440)="156a3bc6cda313ccd445af26c9c3b9c67deab99bf333935de615e05b48e856550cb9679b94522992d1f7afc2b559b56b454429372fc994071e9ddc33cb65ebea58d7321d399c68ab8e4f77d49f2996c6405ed16e6bf1dea9c1c473d665e1e021eac4365b47882df5eb51ba111644ee0c78b3d374bd6c0b2bc711af16b38590ed404bf6e0b2fe8c17df33d8a0aedbff710d978d0bc1215714", 0x98, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000001500)={r3, r4, r5}, &(0x7f0000001540)=""/9, 0x9, &(0x7f0000001600)={&(0x7f0000001580)={'md4-generic\x00'}, &(0x7f00000015c0)="f60eb8", 0x3}) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000001780)={{0x2, 0x4e20, @rand_addr=0x1}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x40, {0x2, 0x4e22, @multicast1}, 'ip6erspan0\x00'}) add_key(&(0x7f0000001800)='syzkaller\x00', &(0x7f0000001840)={'syz', 0x3}, 0x0, 0x0, r3) 01:21:59 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:21:59 executing program 2: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) [ 355.213207][T18573] autofs4:pid:18573:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(50331649.0), cmd(0x0000937e) 01:21:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x40000, 0x0}}], 0x2, 0x0, 0x0) 01:21:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 355.309795][T18573] autofs4:pid:18573:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 355.351412][T18580] fuse: Unknown parameter 'defaultU37emissions' 01:21:59 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000004000000007f") [ 355.440857][T18580] fuse: Unknown parameter 'defaultU37emissions' 01:21:59 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:21:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x2000000, 0x0}}], 0x2, 0x0, 0x0) 01:21:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x2, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000a4000000050000002000000000000000"], 0x18}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0) fstat(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000800)={{}, {0x1, 0x4}, [{0x2, 0x1, r1}], {0x4, 0x4}, [{0x8, 0x5, r2}, {0x8, 0x7, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x7, r6}, {0x8, 0x1, r7}, {0x8, 0x4, r8}, {0x8, 0x1, r9}], {0x10, 0x1}, {0x20, 0x1}}, 0x6c, 0x1) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="20000000000000008478a829520f35b9000000020000000000410200", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) r10 = open(&(0x7f0000000000)='./file0\x00', 0x200000, 0x18) ioctl$RTC_EPOCH_READ(r10, 0x8008700d, &(0x7f0000000880)) 01:21:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:21:59 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) [ 355.588410][T18597] autofs4:pid:18597:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(67108865.0), cmd(0x0000937e) [ 355.622857][T18597] autofs4:pid:18597:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:21:59 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000005000000007f") 01:21:59 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:21:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x7000000, 0x0}}], 0x2, 0x0, 0x0) 01:21:59 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:21:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) recvfrom$inet(r0, &(0x7f00000001c0)=""/192, 0xc0, 0x10000, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) 01:21:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f743030303030303030303030303030303430c7a79c7eab3873c55f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 355.972379][T18627] autofs4:pid:18627:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(83886081.0), cmd(0x0000937e) 01:21:59 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:21:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x38000000, 0x0}}], 0x2, 0x0, 0x0) 01:22:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x100}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000001c0)={r1, 0x3a, "24ae19625dcb783275570a5e5ec159953d10c80dc2678feff81109cc182bbe1c8ccad40516a7c949b119770e980e3f5774946ccdee0c14490a1a"}, &(0x7f0000000140)=0x42) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 356.160517][T18627] autofs4:pid:18627:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 356.185179][T18642] fuse: Unknown parameter 'root00000000000000040ǧœ~«8sÅ_id' 01:22:00 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:00 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) [ 356.259472][T18642] fuse: Unknown parameter 'root00000000000000040ǧœ~«8sÅ_id' 01:22:00 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000006000000007f") 01:22:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) sendmsg$inet_sctp(r1, &(0x7f00000000c0)={0x0, 0xfffffffffffffe37, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18, 0x4000000000}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x40000000, 0x0}}], 0x2, 0x0, 0x0) 01:22:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c646566617507745f7065726d69739ab20000732c00"]) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 356.491900][T18663] fuse: Bad value for 'fd' 01:22:00 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) [ 356.514965][T18665] autofs4:pid:18665:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(100663297.0), cmd(0x0000937e) [ 356.535544][T18665] autofs4:pid:18665:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:00 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:22:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x8dffffff, 0x0}}], 0x2, 0x0, 0x0) 01:22:00 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000007000000007f") [ 356.658347][T18672] fuse: Unknown parameter 'defaut_permisš²' 01:22:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=@in6={0xa, 0x4e24, 0x38, @rand_addr="4c81865b71998080cead0f35d6e96a26"}, 0x28e, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 356.754034][T18672] fuse: Unknown parameter 'defaut_permisš²' [ 356.774392][T18680] fuse: Bad value for 'fd' 01:22:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x104) r1 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000400)='/dev/udmabuf\x00', 0x2) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d249224c2caff75632d9000000", @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030521a303030303030303030301030343030303208000000725b69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756ceb56e64708b7e66d745f7065726d69"]) read$FUSE(r0, &(0x7f0000000440), 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001780)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000100)=0xe8) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000180), &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x2000000, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB="ccd16c2c7a06767ef9855c4c2c64656661756c745f7065726d697373696f090000006c6c6f775f6f746865722c6d61785f726561643d3078303030303030303030303030303030372c64656661756c745f7065726d697373696f6e732c64656661756c745f7065726d697373696f6e732c6d6561737572652c646f6e"]) recvfrom$inet6(r1, &(0x7f0000001540)=""/195, 0xc3, 0x100, &(0x7f0000000140)={0xa, 0x4e20, 0x100000000, @ipv4={[], [], @empty}, 0xffffffff0000000}, 0x1c) 01:22:00 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:00 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) [ 356.838060][T18685] autofs4:pid:18685:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(117440513.0), cmd(0x0000937e) [ 356.872297][T18685] autofs4:pid:18685:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0xc8030000, 0x0}}], 0x2, 0x0, 0x0) 01:22:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000084000000050000430020000000000000c2e15e4884e726a4e11919daf71c83abe2c635e8167510eec149de6ce1432f6f25423ef3c98271f27aa8e69d32305764ebc03506cf06176c9eade50f85c16dd852d65085e26ed0d68984afcbedaa4b3c9fa9888d87b190f38a0d74bb6fb811d33b70ccec295acb61f1c3cf347ae2db65f43a02be9020fdc7b2f9aa0587795435c02b2f7a013509a119505a171f92145e91b76c5c0a"], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000100)={0x0, 0x6, 0x95, &(0x7f0000000040)=0x9}) [ 357.048077][T18698] fuse: Bad value for 'fd' 01:22:00 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000008000000007f") 01:22:00 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) [ 357.121032][T18703] fuse: Unknown parameter 'ÒI"L' 01:22:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0xf0ffffff, 0x0}}], 0x2, 0x0, 0x0) [ 357.189521][T18703] fuse: Bad value for 'subtype' 01:22:01 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) [ 357.260497][T18716] autofs4:pid:18716:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(134217729.0), cmd(0x0000937e) [ 357.276063][T18709] fuse: Unknown parameter 'ÒI"L' 01:22:01 executing program 5: sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000084000000050000002000000000000000034e586b5f1c2fc4773d74d08addc0727abb699fc1d3382a0dd3dd25c9934e5ffd54e681efc274eaafc75b241d4303dc1719a7b7f3f5e173d948860ecd5625b47688f32193e6703fd4fc8a7ffbb0fb2502ea79c4c17d59fd9d630ea37c9485a1fe496420939df5fafa0eaea9c05aaf9d5194ad4aca0960fdcfce0786163f8967"], 0x18, 0xfffffffffffffffd}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0xfe2e}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140)={r1, 0xb, "10f67177918d3796b5f6b1"}, &(0x7f00000001c0)=0x13) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 357.303926][T18709] fuse: Bad value for 'subtype' 01:22:01 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) [ 357.346714][T18716] autofs4:pid:18716:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000000)=0x2) 01:22:01 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000048000000007f") 01:22:01 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:22:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="18c135a1aecf990000000000000097660000050000000100"], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0xffffff8d, 0x0}}], 0x2, 0x0, 0x0) [ 357.631096][T18736] autofs4:pid:18736:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1207959553.0), cmd(0x0000937e) 01:22:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x16, 0x17, 0x2, {0xd, './file0/file0'}}, 0x16) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@remote={[], 0x0}, 0xc, 'eql\x00'}) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:22:01 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:01 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:22:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="20306fbea4eea1a8950000000000381e024262aeb0e80000000041020000000000000000", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) [ 357.762899][T18736] autofs4:pid:18736:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0xfffffff0, 0x0}}], 0x2, 0x0, 0x0) 01:22:01 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="0100004c000000007f") 01:22:01 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000000c0)=""/246) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSPASS(r0, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="200000000000000084000000020000000000410200008f88fc58a9cf", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) 01:22:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x22) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', 0xfffffffffffffffe, 0x0, 0x2) read$FUSE(r0, &(0x7f0000002780), 0xfffffccd) 01:22:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x4000000000000, 0x0}}], 0x2, 0x0, 0x0) 01:22:01 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) [ 358.167606][T18777] autofs4:pid:18777:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1275068417.0), cmd(0x0000937e) 01:22:02 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000000c0)=""/246) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSPASS(r0, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:02 executing program 5: socket$inet6_sctp(0xa, 0xfffffffffffffffd, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x40100) [ 358.284794][T18777] autofs4:pid:18777:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x200000000000000, 0x0}}], 0x2, 0x0, 0x0) 01:22:02 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000060000000007f") 01:22:02 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:22:02 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000000c0)=""/246) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSPASS(r0, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) write$uinput_user_dev(r0, &(0x7f0000001780)={'syz1\x00', {0x6, 0x9, 0x0, 0x1}, 0x32, [0xdc, 0xcfbf, 0x3, 0xe00000000000, 0xf8a, 0x4, 0x1, 0x100, 0x1, 0x1f, 0x7f, 0x100000000, 0x209, 0x1000, 0x10001, 0x4, 0x1, 0x9, 0x848e, 0x2, 0x8, 0x2, 0x80, 0x9, 0x28851a2, 0x81, 0x9, 0x5f8, 0x84, 0x7f, 0x8, 0x0, 0x10000000000, 0x1, 0xffffffff80000000, 0x3, 0x1, 0x7, 0x2, 0x71f88381, 0x1, 0x1f39, 0x2, 0x8, 0xffffffffffffdee8, 0x555e, 0x6, 0xdf4, 0x1000, 0xb441, 0x7, 0x8, 0x0, 0xffffffffffffffff, 0xffffffffd89fe3a0, 0x200, 0x9eee, 0x9, 0x101, 0x1, 0xc79a, 0x101, 0xfffffffffffffff9, 0x152], [0xfffffffffffff216, 0x7, 0x6, 0x40, 0x0, 0x0, 0x200, 0x2, 0x9fb, 0x68b3, 0xfffffffffffffff7, 0x6, 0x8, 0x3, 0x9, 0x0, 0x100000001, 0x3, 0x200, 0x6, 0x37, 0x5, 0x400, 0x2, 0x401, 0x39bf, 0x99ba, 0x1f, 0x0, 0x4, 0x100, 0x0, 0x6000, 0x10000, 0x1, 0xffff, 0xffffffffffffffff, 0x47d, 0x6, 0x4dd, 0x0, 0x3, 0x1, 0x7ff, 0x1, 0x4, 0x2, 0x0, 0x6, 0x1, 0x80, 0xff, 0x9, 0x3, 0x2, 0x7, 0xfffffffffffffff8, 0x8, 0x2, 0x100000000, 0x3, 0x1, 0x1], [0x6, 0xff, 0x3, 0x9, 0x3, 0xfffffffffffffffc, 0x3ff, 0x76, 0xd0e, 0x100, 0xfff, 0x6, 0xfffffffffffffffd, 0x4, 0x1560, 0x4, 0xef06, 0x8, 0x400, 0x8, 0x8, 0x4, 0x5, 0x6, 0x0, 0x8001, 0x7fffffff, 0x2, 0x3, 0x81, 0xc6c, 0x762, 0x9890, 0x1f, 0xfffffffffffffff7, 0x20, 0x4, 0x200, 0x10001, 0x2, 0x7, 0x20, 0x9, 0x4, 0x3, 0x0, 0x19b1, 0xe4, 0x1, 0x100000000, 0x1, 0x5, 0x50e, 0x3, 0xbf0, 0x6, 0x5, 0x8, 0x542e7f13, 0x5, 0x2, 0x2708, 0x80], [0x7ff, 0x7fffffff, 0x100, 0x3, 0x100, 0x9, 0xffffffffffffff5f, 0x5, 0x8, 0x5, 0xdf2, 0x5, 0x400, 0x20, 0x1, 0x80, 0x8, 0x40, 0xff, 0x4, 0xb6d, 0x3, 0xffffffffffffffc7, 0xe728, 0x1, 0xaafa, 0x100, 0x1ff, 0x7ab, 0xe431, 0x6, 0x0, 0x1ff, 0x1, 0x0, 0x0, 0x7, 0x1, 0x100000000, 0x9, 0x0, 0x1, 0x4b56, 0x5, 0x7, 0x8001, 0x400, 0x974, 0xa3, 0x1000, 0x0, 0x1, 0x2, 0x80000001, 0x7, 0xb23, 0x1b7, 0x1, 0xffffffffb8dca4fa, 0x40, 0x2, 0x0, 0x5, 0xc7]}, 0x45c) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:22:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x700000000000000, 0x0}}], 0x2, 0x0, 0x0) 01:22:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0xa, 0x9) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 358.666798][T18809] autofs4:pid:18809:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1610612737.0), cmd(0x0000937e) [ 358.704516][T18815] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 01:22:02 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) [ 358.733764][T18809] autofs4:pid:18809:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:02 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000068000000007f") 01:22:02 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af30efab55fd632cc9bc228bf27a2f3579c6d8aa54ab9f74ad7fe0961c185bc925561a28e2bc40364d8741e716f63cb1ba752c5f136c16bc30c03b243b0452a2ac0f60c29b61edcface72f134b8614c7b7cc43d1e9ab10fc3d41162b5401667"]) 01:22:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffe49, 0x0, 0x0, &(0x7f0000000140)=[@dstaddrv6={0x0, 0x84, 0x8, @mcast1}], 0x18, 0x20000001}, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xd1, 0x400000) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000001c0)={{0x1, 0xd000, 0xb, 0xffffffffffffffff, 0x400, 0xd303, 0x0, 0x8000, 0x9, 0x200, 0x4, 0xfc6}, {0x6000, 0x2004, 0xd, 0x6, 0x0, 0xffffffff, 0x0, 0x4, 0x4000000000, 0xffffffffffffff00, 0xfffffffffffeffff, 0xd9bd}, {0x5000, 0x0, 0xb, 0x61, 0x5, 0x3ff, 0x0, 0xc4, 0x4, 0x4, 0x593f, 0x4}, {0x4000, 0xd000, 0x9, 0x6d3, 0x3, 0x6, 0xfffffffffffffffd, 0x5, 0x2, 0x6, 0x7}, {0x1, 0x5000, 0xb, 0x9, 0x5, 0x100000001, 0x5, 0x1, 0xa88, 0x4, 0x9, 0x28}, {0x7000, 0x0, 0xe, 0x80000001, 0x80000, 0x0, 0xc02, 0x9, 0x3, 0x6, 0x6, 0xd9}, {0x0, 0x0, 0xb, 0x6, 0x9, 0x1, 0x774, 0x0, 0x0, 0x8, 0x8, 0x6}, {0x0, 0x1, 0x10, 0x5, 0x3, 0x53, 0x7, 0xd9c, 0x81, 0x600, 0x9056, 0x271}, {0x3000, 0x4}, {0x2, 0x10000}, 0x4000a, 0x0, 0x5000, 0x40000, 0x6, 0x5c00, 0x6001, [0x5, 0x1, 0x2, 0x7f]}) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000001540)=ANY=[@ANYRES16=r1, @ANYRES16=r1, @ANYBLOB="000228bd7000fcdbdf2503000000540004000c00010073797a3100002d9e6d0cbd197b137f222f00001400010062726f6164636173742d6c696e6b0000040007000c00010073797a30000000000c00010073797a31000000001400010062726f6164636173742d6c696e6b0000140009000800010001000000080002000800000004e433aa98e5a889f9d95b9ce23e18cd2c1ded44f42f4a39de352c388cfb3335f0e575579086e8fe8d10dd631036b70876df0ee94c1cdf93b01b833e9a73f835ade38738cb242f7832c4be08837ea6b36b75623b20d4eec993e5c7bc76803206e5574c31de0e043253"], 0x3}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000000) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000400)={0x0, 0x6, 0x1, &(0x7f0000000380)=0x80}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000340)={0xd528, 0x64b, 0xffffffffffff86dc, 0x101}, 0x10) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00 ', @ANYRESHEX=r2, @ANYBLOB="2c303030303034301ffc10450ea13034322c757300"/33, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f00000003c0)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_nanosleep(0x4, 0x1, &(0x7f0000000140)={r3, r4+30000000}, &(0x7f0000000280)) fchdir(r2) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000300), 0x2) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:22:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x3800000000000000, 0x0}}], 0x2, 0x0, 0x0) 01:22:02 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) [ 358.943129][T18829] autofs4:pid:18829:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1744830465.0), cmd(0x0000937e) 01:22:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4a0000, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x201, 0x4) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 359.071126][T18829] autofs4:pid:18829:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x4000000000000000, 0x0}}], 0x2, 0x0, 0x0) 01:22:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:03 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 359.225027][T18847] fuse: Missing mount parameter(s) 01:22:03 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="0100006c000000007f") [ 359.343449][T18854] fuse: Missing mount parameter(s) 01:22:03 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:22:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x8dffffff00000000, 0x0}}], 0x2, 0x0, 0x0) 01:22:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) [ 359.477978][T18868] autofs4:pid:18868:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1811939329.0), cmd(0x0000937e) [ 359.484445][T18866] fuse: Missing mount parameter(s) [ 359.595064][T18868] autofs4:pid:18868:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:03 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7ff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f0000000040)={0xffffffffffff0000, 0x0, 0x300a, 0xfd, 0xfffffffffffffffa, {0x3, 0x9}}) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:03 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 01:22:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) ioctl$TIOCNXCL(r0, 0x540d) 01:22:03 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000074000000007f") 01:22:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0xc803000000000000, 0x0}}], 0x2, 0x0, 0x0) [ 359.835066][T18889] fuse: Missing mount parameter(s) 01:22:03 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000001c0)={0x7, 0x3, 0x80000000, 0x5, 0x7, 0xbae}) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x307, &(0x7f00000c3000)=ANY=[@ANYBLOB="20000000000053000000000000000000004102000000400000000000", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) 01:22:03 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 359.934729][T18897] autofs4:pid:18897:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1946157057.0), cmd(0x0000937e) 01:22:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) [ 360.024980][T18897] autofs4:pid:18897:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0xf0ffffff00000000, 0x0}}], 0x2, 0x0, 0x0) 01:22:03 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="0100007a000000007f") 01:22:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="7e645fbf49159700000000", @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030322c75cb65725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) read$FUSE(r0, &(0x7f0000000440), 0x1000) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x1) 01:22:03 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0x4, 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 360.188087][T18912] fuse: Missing mount parameter(s) 01:22:04 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:04 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) [ 360.342522][T18924] autofs4:pid:18924:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(2046820353.0), cmd(0x0000937e) 01:22:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 360.399506][T18923] fuse: Unknown parameter '~d_¿I—' [ 360.426875][T18924] autofs4:pid:18924:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="180004000800000000009e3fb2ec55cfe44dcf725dda79b31e7a17bc4a11ae51dc54e677f27b09f29d1853bab5ab35fd9a44966f439546df8f38c41848d38596f1a917a06ce9da674484cb008f653e4b434a6abeaaa38636966b733fb82ad0814b48cfde5b75b2f282517064febd3ecb521419fb5d9d5572249afe4d02a00383e7945c010a100e68044e0bb2f0cfac7fc0c1709e34567846322b239056e530318f4e84c1f5dab4415f4f1f099ef4aec1d8"], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 360.488866][T18925] fuse: Unknown parameter '~d_¿I—' 01:22:04 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:04 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000030000007f") 01:22:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0xa70) 01:22:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:22:04 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) [ 360.689757][T18948] autofs4:pid:18948:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.3), cmd(0x0000937e) 01:22:04 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) [ 360.764083][T18948] autofs4:pid:18948:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff9, 0x400000) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) write$P9_RFSYNC(r2, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:04 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000050000007f") 01:22:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:22:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000p00000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) read$FUSE(r0, &(0x7f0000000440), 0x1000) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000100)={r2, 0x0, 0x10, 0x800, 0x2}, &(0x7f0000000140)=0x18) 01:22:04 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:04 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 01:22:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x1b8, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRES16=r0], 0x18}, 0x4050) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x100001ee, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) r1 = dup2(r0, r0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x98f9, 0xffffffff, 0x0, 0x16, 0x9, 0x8, "2fba24ae52740bf4d2f6517a48e9ea203dd763d8624058336d75fb9d00e5332fc38a5d8e5a9c78253bcc095db0c1823681986d656418a757479f30f2ba93b9bc", "df0681478412b24987abd46902a2c6a318d19363a966ace38aa287cddc50a50d62ed49e36fa36119f263592ca48a7532645ed2fdf4ea1aa594dbad8db192066a", "c91088e647a95ef81de53f9c2774537d4af283b7ed818244e7be9d03d573e257", [0x80000001, 0x7]}) [ 361.139897][T18975] autofs4:pid:18975:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.5), cmd(0x0000937e) [ 361.171381][T18977] fuse: Bad value for 'rootmode' [ 361.223346][T18977] fuse: Bad value for 'rootmode' 01:22:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:22:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPOUT\x00', &(0x7f0000000140)='mountinfo\x00', 0xa, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000000)={0x67}) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 361.243594][T18975] autofs4:pid:18975:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:05 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:05 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000060000007f") 01:22:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0x3ab}) 01:22:05 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) [ 361.541030][T19008] autofs4:pid:19008:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.6), cmd(0x0000937e) 01:22:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:22:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 361.585041][T19008] autofs4:pid:19008:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:05 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000140)={0x2, 0x1, [0x6e2, 0x8, 0x1ff, 0x0, 0x376f, 0x10000, 0x100, 0x8]}) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000040)=0x3) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="200000000000000084000000020000000000410200000000246ff971", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) 01:22:05 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000070000007f") 01:22:05 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 01:22:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 361.890889][T19031] autofs4:pid:19031:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.7), cmd(0x0000937e) 01:22:05 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) [ 361.937553][T19031] autofs4:pid:19031:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:05 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x55513b56d0e9684c, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000011c0)={@l2={0x1f, 0x7, {0xfb1, 0x10d3, 0xfffffffffffffeff, 0x1, 0x0, 0x7}, 0x3, 0x3f}, {&(0x7f00000001c0)=""/4096, 0xffffffffffffff7b}, &(0x7f0000000040), 0x48}, 0x472) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet_sctp(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:05 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 01:22:05 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000200000007f") 01:22:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$P9_ROPEN(r0, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0x8, 0x3, 0x3}, 0x3}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030d6303030322c2286dec790757365", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6465666175288c446f01e727a0db20dafaeb6c745f70657234d65dc5fe8401732c007ee93fbc"]) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:22:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:22:06 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="2000000000000000a400000002000000000041020000000000000000", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x3, "491968"}, &(0x7f0000000140)=0xb) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={r2, 0x78, &(0x7f0000000300)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0xc}, 0x8}]}, &(0x7f0000000240)=0x10) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000340)={{0xa, 0x4e21, 0x7ff, @rand_addr="aabaa12d965d83b65c148a096a7ddaaa", 0x7}, {0xa, 0x4e23, 0x7, @remote}, 0xffffffff, [0x4, 0x4, 0x7, 0x80000001, 0xfffffffffffff3b4, 0x100000001, 0xe8, 0x1]}, 0x5c) syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x200000) [ 362.326100][T19059] autofs4:pid:19059:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.32), cmd(0x0000937e) 01:22:06 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:06 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71fe2ba0f65b89868851e43fef589f379d700ef8d8500390198c5c1c84f90990486e0cfff337b34fcc9b28d15adb46af3"]) [ 362.377964][T19059] autofs4:pid:19059:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 362.394200][T19061] fuse: Bad value for 'rootmode' 01:22:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 362.440590][T19067] fuse: Bad value for 'rootmode' 01:22:06 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000400000007f") 01:22:06 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)={0x0, 0xe6, "4bb85d3c558916b2c631db9cacf02125bebec4e5aae69e61a05304283263e37276f6c92ce2383862932a3928a39bacb6334126cfd571f9afece0a6688e33b9547ec1ab373ebb6d6073538e81beb11c499e7c951a505c35ef92c8bc74e943afabbfff86962fb92f251c69e3ff429c445cd6159fa638792a7be90b9b81a3ca0adfe9bcb5c592c977bdf3f7125e7f6e4a48807e32f176ef0073f812999da9e628d232055698b45342700511978273f32162fce8fae6e60f7427cd6c70e971daefabb482561968139c78dcc517204973ec4685a54ef7306c6706ab846f282d5056a7e93bc6a5b123"}, &(0x7f0000000380)=0xee) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001900)=@assoc_value={0x0}, &(0x7f0000001940)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002000)={0x0, 0x800000, 0x5, [0x7f, 0x5, 0x3, 0x0, 0x8001]}, &(0x7f0000002040)=0x12) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000004480)={0x0, 0x80, 0x20, 0x0, 0xffffffff80000001, 0x2}, &(0x7f00000044c0)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000004500)={0x0, 0x3, 0x2, 0x1, 0x6, 0x8}, &(0x7f0000004540)=0x14) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000004580)=@assoc_value={0x0}, &(0x7f00000045c0)=0x8) sendmmsg$inet_sctp(r1, &(0x7f0000004700)=[{&(0x7f0000000040)=@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000001c0)="6d87d1f92afea2ea91f2f00bfc3d7dc7dafce05c390bf5fd6e1ec0a23295f7103f2bb3c314a2a497d20561b6fcbcda5419101e74a99d286279b9fbd9f3a390dc47cad32e09d427d767ba89505c674c61cab7bad67198ed4bb05ff45bca47182fa1ba32ab7a8bc12b24065cfa726e1a48799d96f35bc1d9a55946c5cf5fb1e6e360b04c0eb8df7d27", 0x88}], 0x1, &(0x7f00000003c0)=[@dstaddrv6={0x20, 0x84, 0x8, @remote}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @sndinfo={0x20, 0x84, 0x2, {0x5, 0xb, 0x100000000, 0x4, r2}}], 0x60, 0x4000010}, {&(0x7f0000000440)=@in6={0xa, 0x4e20, 0xfb0, @rand_addr="60825463bed3944c3cb9b590fcdb7af3"}, 0x1c, &(0x7f0000001880)=[{&(0x7f0000000480)="ef26b55b9e00699a032b06931ab603b6034f6f4c0f27a98c713d582a6b55608d7b62c6f32be6642766fb67e1dae5fbf56f296799fd407e616795e674e8ff922d1b865a402ab6553d30c58b00f22a097b4a7dbe057c85e5c1f20c3eff99124d6dafb26d4647c63380a5a8f2ff21800337df08186c3a4435bc947dd3070a661d374c3eae03a60ad007a07847e92a", 0x8d}, {&(0x7f0000000540)="2a909af2240fafcd309495af7b7bfa0f06a1339553f8f3f8391299d388c9710343eed291eb688fd76f2a86884615042891d9454cdfe9158296c1049a71dbd35bd6e3b7a0b30e359c905d6bfa69b289c9078a96ace780bd82b411255d1185499dc163259307147ed7d920ea571a956df295007a5f5b8d61d7c4c82a91d853b3a563c4efaff12b7d02af1d5bccf29a83b7ce592a42ac64569de805c79a3cabe794c6e3a1f832be12da2c511beb60030d74b796de4ee5b69dbab6f0ac993a19da2ed90ba880ffe87b3be81764eca0462f31adad61317b734e12a32b45a192c44c76104a5f247989ed035616a1a2eb02266cc612c26deafcef6cfa50ea337b5df59ef5fe5bf8a122a0eb57fcad367cf22e0ee66d4045b1249546fce9c4bacce55ff951a2e68f6b69979930b23d14bd9365f3a60df8b27aa71d556938a1437c3d2763a7ff248dcd5e1c06f885c2789383747104bd0b89d3b965cd51e49fdcff7a490c3cfaabf9a9d07aa468c4854d2a7df5330f9b52d1478a6b973fedbd6234e0ad8d3c09ecc1e501db58073030303d5cc3dcd2b31b97992cf223b4d21474696ff1ae59207663e7ff77ad919a9bc123ae47445d5f77475bc11f952f8f10ef80ad3fc72a4793b9c8d819b5983a1020cfb7a7ca558e67478068837e67efaa7ea3a3fc32811dfa70582500bf4ffc56b1f6f351c7d8d73e8a0addb054febdf87c88e7f796962dacbfae685d5702e1c4d2330d8b1025503e86aef760d0b0e2fd9f60856d798ca573bcca97e588533be95ecd1a520eacbfe92e569fe93c4123b25e95c1cb45fbbf7933f6af63b2d23d40abaa997474a25602ca989e65bc7e3f6eecea2d819f029faf309882869561e6931b57f98a50ae708ffff19cc8b4b602980e179c813821e22d3e3ad761dbc2c676037839093e678155ccabfa84711a0ccba10c10b899c08954cea6cfc882811fcd7d26f239f838f0cc5de3a5822cbeb7f7ac466c4c08a883f27f5bd999f9b619e72b85ee9fd5c7a5a7ef4729b0dd7ec3cce974825c0a8f443e5972fe6a329bc2bc9c19265bca8cac5fa6d5afc3e8c51696925cde8818aa7acf70491db8dca519a8587f955bae2c747b91754c231448ae7affec0e3b641cced13d6e293248e814ce9de58fb71b27edd6ee2f19a988b499dd7c22199063580be362b743a23f53e3c69e61bb2d9158be2d632fe61c5e02bc70bb099f386a72fe4ea4ed3889bcb92b76ebde193c670c42e461552ec8827f26a16000b7f3dbf394fffb688836f967f31755a27d9027461a94a7e5572cca146309f240a09cb13e8c0e222ac7007cf7dc845e258082bd57cc1227870b9c196721fcccf870ff75f3e4e9752d5e4aebf14404222a3ca05ba4fb553a09c771d8e7737c1b0b327bdbdeb4678cf02382b80eaef40946375f2fbeabdbd88565221e05b036250c0ad4b5ea020f46a64c5d548360d7ba41a422e57722c12b3268b3e86bb6092805be5d86f6bf2e446a8f02bc4e59cf49b794d891f3831551a5f2a8993892937241e2c23838215e2e142fd9f8850a4ad37073e1693b9796ee406798a0fc4b5f4e855951c4be047ddbcc8d3d1f40c78fa4c995b05ebbb084fd9b4d093a9fb6cbd6704c92c90c80ffaff83ab71cbe69846f7a53c59f9bdcc2569b51c5781d1952ac166dc28ce7bf4d8b57490afe07540fb48bb5143f074057a6c18f847fbc66c96e8ba620845c07fcaaa90da0fe00fa3d54c582c0ade683e3da12f61300ed89531cbfab75c13dd2398f116ba2339f5d76f4541571e35d3480128675949dc4d950001afed120b8127982a74ee7a33ed22e5d1845030ca5b760f3ec29791c0b7a0d1e268dadcb6969a11d05cb62690153e18f16a593242b9daf766d1b6d807f1b4243cc149f68d532dc884f1025435bf42fac989cad4ee497c833ded7189e0f1b9da6b1f88b8be30a08e00bf8433dbaa5a4dee3e1077e393a96f327efa186cdbac67cb205f9cc2c8ceef327ce95f14f6e53b1662767bab6e36e2fc9a1c36bb59be5a6880ab61eab7e3e7a993d91195ce3b8b46744fe1a4a14237d7274a80cba78101954c41f873d56e544df4a4c3dab3251a888c80d2cc7416851d972902025a25b3d0bb85eb342e57e4c6349f07af404def5994fd3bbdbd27a1fe63e35b697a84fb794f0c6af6f6b56aada87f28c79493775819dbb28ecca39018d44684fc43a9f26cd18bbf7f08e2d8e5236146a600f9d385ac7e852c6bea4aae477a449dc7d6eedc1928172d99229a099efd37b2f7424887a2c435d13b10a62ed712f2af4921a3bb76c529851f4de6f803b2b9bffe7d5de4bd4dd02ada4363a48bee1aff3c4cdaa9d4167fe3e687e008229acf0df9c047d108b96ed5042de93e6cf67ce84e3e0949329609fdb1412835fa29a4876ff6f55196a73f1b5426c7ee131de8d64bb313e0db908bd1fc7f0ef0ab093e8d34a1ddaae0422db37c2548091e885ebf37609c2f41b911aadc6f1618c908f4f89a911d591d058f98f053b199e29c10d9447b0f4635bdbbb7a295dd169f13c3d0ba75dda6ca930cef0c612183a5e06aff243b8c31ba1211730e975e30f2d42684a028e64a98ec5a17ad4694085653701f4b32c5ce3cf882624004db61587ab43a65372c2023376dea659a5b0152e8c98547f753f864b4cfb708d34b1b0d5156efd22f03281bb78f74fb1e8ca98f95737160c05fc6cf8a0476c4fc13b05aa27e202d553e44f3066939beddeeb1cefaa2c0b21e0d192b0f36c1f2dca2ea40b13c3c2b390783141774537a347f05b7741a96413a6214ea5f656fcbe227877256f9933089a151f153842f7b5ba17dfab3661a39ac7cfdfa8d04f6726b67b4e27dad459472870ea5cd548fd1bf5ba0250fc44eb6f4f99e048ee0478cd7fd5572f421df04cfb1838627625d09ea6cf4511fdf7b61cc0b19f8c306e25d50af162879cb2e244eb408c29cee958993b4e56a04e680aa5409a1d07410887f920cc8975df2c06d2a9c5abb78a64f99e1f34f44b3d42ecf50a07b3c9e2e54afd03803807ba06e18bf5f6dc427438c6a98ec1f51924daa99c49bd4a3cb369857d403a01ac64b847b3445fc4554b660511faa6b3a9f3046070c21577d1a33f26c58d77dbf06ad9a030aa5afed50d071e2a8fb7a0d3360756dcef48e484d9c9391512c82c871340913af2f1f62ba8a4fb32f86a3658d4635d01b23756871376aa75b63d418c9c15fda718d75b7695209145ba9c4ab6f55eb739dcbc9a4afcb15c0f9f555d9d9972445bc569045439a446e54c600736bda7d9228a08d2411f95edc08eb07fd9fad142d3f66fb5c167683079569cdae7739028ec06df5b1d437baf49fac7dee5f0d7111c7bd16a7501d10dc313bef64b837373b6c70d208672058d56708825308949ea49d077b0e397d2ac5c153ede3fb6ad4a9a4f1098fe59a5223b8d9eef38816edc3801f24c10de2d3defbdc5a039ae586c7310282f4c7b6f6653c7102d5eed9a58d233c448edb04998cb76a3a56888bf59156f30a64ad17d9452db408db5423329460f70035d7b297a22e0abc283be2a4d96375fea967315f3bd6efe155e3bd738b1e50268bc1aaf648961d32debb8a737dd79aa884ee2b54e5c745ea75d79b71247b20efd128f3354a400facd9e47fe86ea7d130ffaab3662685dc38677cff0b07337aa1d0a84174ba8d86e5cb63a9d6c09a3d6178611ce8ee7f4a5c3b4bcccd7515cf03b31664197a504fd18da2adb4761b65b19597a799f8c986aed386973c06fcfff6f96ac43a33326b69a23284065aafb6f03e151bca7b74d77c57bf199f135dadb3967e7b23e5d89e33e3da08c131cd21ef98d1965265dbc473a8065b42b1538bbe0bab1750e8687bc5c6ba1d98f62dae68e2ad3fa469c4baeaa606f6a4a4e0c4c731b8397272213d159b190ebd073045aadb7c601a6ba5de257263b05de92f6fbb435fd7826ed6322a809639b48fac65dd40bfb4075f2003dc397c558d8e138777f955600dfdd131432de65d09402909692d6dbc949676d2c81e0ded83978db733fb79ea6695bd3941c5ada2cf162ab8d3131812e8d02e51afaf8cb384484e1fe4cada7a21448843f5bb8137406b30df63b38e2c35037fa619bb14d6e370ccabab053fdc05febeda0a0abe042964b77a1418f2c990332e3a68f94f56a135b19b0306a498235fe53275f380b1985f71536f97de396fc392468c92e15b2a98fed3c94fb5f2628391cb292bdf4d86bf223594253bf3ecb7f0fadece5b48b235fd98aca25fd80565cda2aed610db9049a5fa54accc0a5d2b4c00209db206c23d165506a8be404f06480fd1b067fa778eeba254830a563cbeefd918095a3bb6e7bbf0f4b8455940ceb95a6a64c561f6e4812dec15013ea53bb1ea1c974118f16a37294f40dff55eb2a132faf3f0b2c6e71d7c50ab2cc9164d859e9f2573213ded765144a4ce0e5b8efd51206b2a00215be2e694d2e63f5ff88a72b9cd57026bcb9c20a08ca6b37675131c7ffe2b0d358b420dab45b896028bcaf7317709b90b6cdf595acc5a67841dca03f5cca316173b63131374239d86a2aa316dc1b05e26be2e851675fbe7a3c00373d43f30a5c135fea07960e74feb3c1a40aebfc31b4473af292f0ee966372f235a9d0152519361ecedd6b1ce2a537a3d3a0a5defafeefdf75990c327fff025c98ff40aa683489f5f05fde83f00b62acabba7e80baabbdb1aa9be0faa5b4ea53aa59fc216f331d48624d3a1e7e9c30579a400615b6a16d7b9485f945e73b0d668c78525960e2021afd204bbb0ea610480c6b55eb45e9be656c8cfb072bf37fc8fa01f255f37a0da435391f468d55d7b92c98aacb0b78e44e35adffa32f42d3129cd90a02a504284c5054e1e493b59fd57db3a8debae94c34285f915202f3bbfb51cbcef29d8df3625b27c62df4347a26f69a38280276e554b57ddedee54e20ee69fecff0900c9678d9238949220fb23661d2ee91614169de199a5a94cfd4e9a06245b5cb3ec700bfdc34221c889a955699c53ec67f397550cfff48b59e18a38bcb33d9b0f880f604166e16efc97b3927c5612d555c11c37632855a3daa19447e5e3e787259269ee00aeceea0387133f900973fb1ad9292f7d32c73379ed4f80b8288a113cfbb3ccc20de52baebbaf0ce69955372c683b4676a68ab2fbfff0a90462871d593bed8798bb5bca06bf7e17c597b96961161f6cdb480bd75da99416c5fd2e401eb7ac0f62cf7fe138d82fdf1b3664e1b91bba79be04462e1397fdfb2042df3b40a295a24fa32125ee466cb14e5442300057b655876a673a713ac235039fd4dd82b183413bd02ac42d3e4d6c81a06d43f164cc55883e1edf4818a60e3fe61b59f64baf58ab8cef6e4f4f791991479b5515bf595f55488f9c895c9763696f58f6f27f2f0a7810641818d094246a1a74fde936362de557dcdd56a057c7164095437b26f70ae7ec894cf3b5ddbe988493aaa27a1619073fadb8404ab6369a2d1ac65cae3b061d53f4855dcd678ccac27679c12bf9bb1662d11d1b9ed1788cda93fbca64f79a5c748ec9c3b22abb64bc4a92c80516f82146baf6155554a8cd6569c05c92eaa581bee9e3c110bf1dcac66e89ba358f5547b263ce64e9ae98a6a06c0affe93d6a5bb2bff71874ac7ec1d5a19389dc88ec7b0f53a3d51632ec516d799167b12209a9296ec01fdea654fe9e4c858510f666ac1bda5dc84a7f773a2240879443f9815ad64c681aa205fde96a7407088b1ee1de94920f8d7b0f3e265e26c53de4e58f01c1bb6edfc10", 0x1000}, {&(0x7f0000001540)="ce1e91e60d47a52560e426cfaef7ac447197dfeb2adc3b01dfc7f0e51c3cde44539ab6791c4d8a49d85d63a325fe3d2e3e15797127603ec49517631e9a01fc2ee0972b9e40337f611df4e76e7f6143ff85d85f1c08c3b1207c1dda4df315dde9fbff9bce6ac6ac2a228596b580a10af4c33702521e327a6e020be8d3884e4b2315074a985c267e858e263d10091673644e7ab857df251633cde128a03e68531fbe798733b2fb400d675bbf7091da0d148e2facf77542197d6d96a63433e08840ad6eab7872e0d41b500bc69b3e57c522", 0xd0}, {&(0x7f0000001640)="d311059361bfd0335f8299abdaf1409a35ebda785a0f45ff0189d2630b895b4a99e2d5e950fba8055fa2c5d82688e371ce44a7ce9690c2c99a1f602a6a1ea649aa1b2104a7d1a2b80aa67612b219b1ae2bb1835f1defd4487a46003a3ff9f2ff706ea605583fbd515b34be12b7e48f706f071db5c6be5eac2d95d097f2be50bf1e8ee7b586a29e82f1b0c603ea4f646cc37fe6192fed5288dfc96479e63e33b20b3e184475bff1c1f491692a542f6e5ea4b4afa5", 0xb4}, {&(0x7f0000001700)="109336f1f11ccf7ad22d48bdfbbdcee4021388d5c29bcbeb8c77f2908b44449f9a15b8c636fd5f7a20d6ad57c389f90396e21c4725d1bebbb0fd66f856852ccfebfb7fbfb6deddb237da22cbfbc3b98c1dd28c1a042b0b69880dc96681ba9ea51ecd490c03b19ba03e2e0c9196a45a80cd49c875efbd24c2f91328aa86de8a39f9698d68dbb0c0", 0x87}, {&(0x7f00000017c0)="eedf39658391bfb4006f490e3377f7591085e3c14dad2760011a1936bb93f5edc4c730c4e3717e69d92497e27f697ab05f8c904f793894024f1623f423376ebec7f739d17cac5bbc1d03a166115037cc65340c156bc96e30e85d0b74822e4f97a0bae8f8f7dd37a51ba7a8cd80f5acce58c9611dd22295e6f2cf986869a8df8605f2743b", 0x84}], 0x6, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x9, 0x0, 0x3, 0xfffffffffffffffd, r3}}, @authinfo={0x18, 0x84, 0x6, {0x24}}], 0x38, 0x20000040}, {&(0x7f00000019c0)=@in6={0xa, 0x4e20, 0x6, @remote, 0xe4}, 0x1c, &(0x7f0000001b00)=[{&(0x7f0000001a00)="cae3cce5274b9400a15089e9f79d27e8007f53a6c3c06833e09a4f9bc6465c369c2cc12a22d3f12a4c9efdff1af05e24d68a7eedd1b96f554227f475306e2d4a15a9881e6b17d164c3fa", 0x4a}, {&(0x7f0000001a80)="2cfe0cc59217f3e74a095fa3e7a291800da9f9acf40a7656c8e0c83c21400ae372073b3c30213dca035d8648dc8bf77e9737c7283dacd89505b265968ec99346477b1c476ebf0c5afa53", 0x4a}], 0x2, &(0x7f0000001b40)=[@prinfo={0x18, 0x84, 0x5, {0x0, 0x9}}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @init={0x18, 0x84, 0x0, {0x3e4, 0x10000000000, 0x7ff, 0x200}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0xfffffffffffeffff}], 0x68, 0x80}, {&(0x7f0000001bc0)=@in={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001c00)}], 0x1, &(0x7f0000001c80)=[@init={0x18, 0x84, 0x0, {0x6, 0x5, 0x2, 0x5}}], 0x18, 0x4000}, {&(0x7f0000001cc0)=@in={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000001f80)=[{&(0x7f0000001d00)="6765c27ed656b0e0a1a9d9653ce7b347b7559351fc5e1f6dec0b26fcab9c4a3f333bb3f9be24dfef35dcff236c9a8b3c4af88049edd6980195fc0ca64aa848399dcf2067acc854c3612ceded00f3863b56453a9c5f86b4", 0x57}, {&(0x7f0000001d80)="b91911f19d817cf5136fe15e8548b04e56b6fc5e90aab584d5715ee0", 0x1c}, {&(0x7f0000001dc0)="2d3b7d2afa55e336de2c080d2767c5f1e8249fa2d8fd4b3719f4929ffc115b53fa47eb6655a23604b40bd8d12c298cdf84d630c031cbb71a1d1fc74cc5bb484ba931a23d38660b3a30c4a705ad9ad86f27cde1c9f9aab36598dfdedd8c36dff5f4f83f1b93372f5b3f7fdc072cba8b26658f6053ec3853fc788f42644ecc7c92901a5d9a72fce4117e5f5003ffa1646cb6771a1715e41337ee6ab4f311e25e874b3e0c860e9bae60cab65c701511d4c06e7ff1d2f4117647c87758aac787fedbc30794d49e978785d495dacbd2e528baac8033e234b10947", 0xd8}, {&(0x7f0000001ec0)="cd", 0x1}, {&(0x7f0000001f00)="65d577b8d0cdd9ae86ea46dbede970abb3b505ba9864976142e428f30a30f94b8f0c85f2e2be89b27ea6ae21105ce095b136511108a8e7269da5346e2f019c98331e323a492af76962087db88c296d5b8852060c7d7e498a800e13afbf73beaa99897d8325cba82180", 0x69}], 0x5, &(0x7f0000002080)=[@sndinfo={0x20, 0x84, 0x2, {0x1, 0x2, 0xa23, 0xfffffffffffffffb, r4}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x3}}], 0x38, 0x20000000}, {&(0x7f00000020c0)=@in={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000002140)=[{&(0x7f0000002100)="ab1a38c3c66b3265320ec809c4cdab32cd467bc3b7f7a8f7a0f265cf44cc2d492272fc91b5ac", 0x26}], 0x1, 0x0, 0x0, 0x80}, {&(0x7f0000002180)=@in={0x2, 0x4e20, @rand_addr=0x4}, 0x10, &(0x7f0000004400)=[{&(0x7f00000021c0)="ebd5577ee6fa123e3b", 0x9}, {&(0x7f0000002200)="1491041a3c423a0c575cb6d9b2b157e3a4cb9df6dde718e91f2f288e30f28c6efad4aafeef9bf8a85e7592bedd9cb950e284f5bd0de03783c4fec5210c332ecf654eae9da4dd3f413ffb77416b17fd1affc57f947ef40d45bc6ef9ef407ae2b5755da6556d443d654da8cbf5d00f682742ad0f3ba1c434eb569601944690ce1bc10959", 0x83}, {&(0x7f00000022c0)="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", 0x1000}, {&(0x7f00000032c0)="22ce4ed5878367a2ff0fd79d527c45d97bc01b0a8cda17d2294deb33adaf9aee60d39e74a660", 0x26}, {&(0x7f0000003300)="4974dbf8349a9d27fd7cf4753ef9ac5d4b44af95c656cb23f9c7716935243c206801765267a41b95b616d06ce564159eb0ba736a0dc077dfc58a1bfabeff9fbc2e46958be2f898b17b46142241", 0x4d}, {&(0x7f0000003380)="d13afc16b0a800b97aafee77e63ca4d89714d2319a311ce1b7fb1cb07b", 0x1d}, {&(0x7f00000033c0)="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", 0x1000}, {&(0x7f00000043c0)="26dc6bc2771abb6ce2", 0x9}], 0x8, &(0x7f0000004600)=[@init={0x18, 0x84, 0x0, {0x2, 0x2cc9, 0x3, 0xffffffff7fffffff}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0xff}}, @init={0x18, 0x84, 0x0, {0x4, 0x4, 0x5, 0x4ef1}}, @sndrcv={0x30, 0x84, 0x1, {0x2, 0x1, 0x4, 0x4, 0x5, 0x1ff, 0xf826, 0x2, r5}}, @init={0x18, 0x84, 0x0, {0x0, 0x6, 0x7, 0x8000}}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x3, 0x200, 0x56dd6608, 0x2, 0x9, 0x401, 0x8, r6}}, @sndinfo={0x20, 0x84, 0x2, {0xfffffffffffffff0, 0x8, 0xf5a9, 0x100000000, r7}}], 0xe0, 0x8800}], 0x7, 0x10) 01:22:06 executing program 0: getpgid(0x0) fcntl$getown(0xffffffffffffff9c, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000180)=']procnodev\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000400)='\x89&\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480)={0x0}, &(0x7f00000014c0)=0xc) mkdir(&(0x7f0000000000)='./file0\x00', 0x80) r1 = syz_open_procfs(r0, &(0x7f0000000380)='net/ip6_mr_vif\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r1, &(0x7f0000000440), 0x1000) prctl$PR_SVE_GET_VL(0x33, 0xb306) 01:22:06 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 362.699338][T19084] autofs4:pid:19084:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.64), cmd(0x0000937e) [ 362.722692][T19082] fuse: Unknown parameter 'defaulT_pessions' [ 362.785723][T19084] autofs4:pid:19084:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:06 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 01:22:06 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000240)=[&(0x7f00000001c0)='/dev/vfio/vfio\x00', &(0x7f0000000200)='\x00'], &(0x7f00000002c0)) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0xff}, 0x4) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="200000ced60ededf70a9000000000084000000020000000000410200", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) 01:22:06 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000480000007f") 01:22:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x4, "cb8c16d9200362fd4e7c535e4e07d22be091bf82a01e6ee126ddea4755721993cd3b8ade2926e89ad8f343aac9cba4efe088dd44a74fd49759ff42366e1189f0", "81469e097bc7e6f76ebf15f08c8d07ae98e7bb11e1b2e3d0225e2971efae9ed4", [0x2, 0x80000001]}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, {0x8, 0x3, 0x0, 0x7fe, 0x9}}, 0x8) bind$x25(r0, &(0x7f0000000040)={0x9, @null=' \x00'}, 0x12) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001480)='/dev/hwrng\x00', 0x400000, 0x0) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:22:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:22:06 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:06 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) [ 363.151642][T19114] autofs4:pid:19114:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.72), cmd(0x0000937e) 01:22:06 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x4040) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000280)={r2, &(0x7f00000001c0)=""/147}) [ 363.195590][T19114] autofs4:pid:19114:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:22:07 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:07 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="010000004c0000007f") 01:22:07 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000100)=0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r1, &(0x7f0000000440), 0x1000) 01:22:07 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x80000) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000140)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) chroot(&(0x7f0000000000)='./file0\x00') sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 01:22:07 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) [ 363.522203][T19137] autofs4:pid:19137:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.76), cmd(0x0000937e) 01:22:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 363.610492][T19137] autofs4:pid:19137:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:07 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107446, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{}]}) 01:22:07 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) sendmsg$nl_crypto(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20104}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@del={0x128, 0x11, 0x8, 0x70bd28, 0x25dfdbfe, {{'drbg_nopr_hmac_sha256\x00'}, [], [], 0x2400, 0x2400}, [{0x8, 0x1, 0x9}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0xfffffffffffffff7}, {0x8, 0x1, 0x6}, {0x8, 0x1, 0x40}, {0x8, 0x1, 0x3}, {0x8, 0x1, 0x98}, {0x8, 0x1, 0x6}]}, 0x128}}, 0x48000) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) ptrace$setsig(0x4203, r2, 0x0, &(0x7f00000003c0)={0x2f, 0xff, 0x3}) 01:22:07 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000600000007f") 01:22:07 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffff9c, 0xc0405610, &(0x7f00000002c0)={0xb, 0x4, 0x5d, 0x4000, 0xffffffffffffff9c}) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',defaulT_permissions,\x00']) read$FUSE(r2, &(0x7f0000001780), 0x1000) timer_create(0x1, &(0x7f0000000000)={0x0, 0x3c}, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(r4, 0x1, &(0x7f0000000140)={{r5, r6+30000000}}, 0x0) 01:22:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:22:07 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e40a8781687fa368730c78ebe2246db65f27e884cff3d71f"]) [ 363.906890][T19162] autofs4:pid:19162:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.96), cmd(0x0000937e) [ 363.947424][T19162] autofs4:pid:19162:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:07 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000680000007f") 01:22:07 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, 0x0) 01:22:07 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x2000) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000040)=0x7fffffff) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000002840)={0x0, 0x7ff}, &(0x7f0000002880)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000005280)={r2, 0x4, 0x812, 0x4, 0x0, 0xdde}, 0x14) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000004e00)={0x0, 0x8, 0x1000, 0x0, 0x4, 0xfffffffffffffffd}, &(0x7f0000004e40)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000004e80)={0xff, 0x8, 0x80000000, 0x9, 0x0}, &(0x7f0000004ec0)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000004f00)={0x0, @in={{0x2, 0x4e24, @multicast1}}, [0x100000001, 0xfffffffffffffff8, 0x1, 0x1000, 0x2, 0xdce, 0x7, 0x7fff, 0x9, 0x1f, 0x5, 0x20, 0x9e2, 0x1f, 0x6]}, &(0x7f0000005000)=0x100) sendmmsg$inet_sctp(r1, &(0x7f0000005140)=[{&(0x7f0000000140)=@in6={0xa, 0x4e21, 0xc4b, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}, 0x306b}, 0x1c, &(0x7f00000012c0)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="d0616761f5e70ed2c4d834ff14079b5d9f895a674bc18f6e1db6c720ae9dd1f8ef0d19a762ea21644b6dd7835ea7e8ca03c0102948490d985502370fb793d55909e0a6a999825217babbe936a8766e8e58024ccea44e3043f1b8cbfe5588c0a5a9ebd427e881c1fe1d83f12855150d0505db8bedb9cb4f192f2435d624664680c1eebf4070554425e1f98b7eb9b34ae24da516d1ff89ad6a9e440b178f689456d1dc08e8e31b1dcac162318f4fce0bc6f83d6c840cc14adb1243af95ec93ede180159612ab84abd33959528b09c6a4", 0xcf}], 0x2, &(0x7f0000001300)=[@authinfo={0x18, 0x84, 0x6, {0x3f}}, @authinfo={0x18, 0x84, 0x6, {0x9}}, @dstaddrv6={0x20, 0x84, 0x8, @local}], 0x50}, {&(0x7f0000001380)=@in6={0xa, 0x4e24, 0x3ff, @rand_addr="c0fc6c7fc14610fcba54315ec86be2d0", 0xffffffffffff7e1e}, 0x1c, &(0x7f0000002600)=[{&(0x7f00000013c0)="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", 0x1000}, {&(0x7f00000023c0)="02f90f84c70ad346a73ee4fbc2eae9071cf4497f27a596d8dcc82e9f07d3670d06a36c90567ed8bbd92f65add0e9afdff7e219a4f372206c18a076e97bea25d51af574cb8edb682bbff42122bde41d4744ef126982ff01ad4072ec6ac9640b1f86fdd6234da7307f9719b9cef4a718078cafe6c9da3d96b6d85045b27e8b7bb13bbdc01f072a31c333f3c646f16aeee3830708a54cfa64ecee445810ad147a", 0x9f}, {&(0x7f0000002480)="b12f84c389986399139e7709673a34fac5b4a2dd8df4bd03", 0x18}, {&(0x7f00000024c0)="4398cd2a03f0ed9013c33d7523e366bc090a543800ac845f22046d1d4e1f30008c298fa46a3a3fec0a9d6afcfc19d4da704488a0997252003ad937323bf7e0f263a937dcea8a72a8ceeca2041fd34639fbfee6d131953d658deb5b1747d85918146dc17f3be3f550ff3a13fda801d99e013c0627a7308bcf3595c9d0b32ddb7cc85ab3121872605ea6ce8592cd3ff0ec3db483edc6b8", 0x96}, {&(0x7f0000002580)="c1ea2a0788ab87ded5978e2d3f1af7cef069c388ba9c17765fc28e00cda3245668c9cce78b08cde3947edc1122f202b8ef0ce0af3525a01e883b5935c8c9aa1c0ec9f6c9a9bf12f0b96c945a1d4c66ba7de75f33bfe8ddc0191f0aaf53e0bf6a01e744fe1f5060b0fac9c8a1f8271bb82113f32aa3b535591e8e28", 0x7b}], 0x5, &(0x7f0000002680)=[@init={0x18, 0x84, 0x0, {0x2, 0x3, 0x9, 0x1ff}}], 0x18, 0x20000000}, {&(0x7f00000026c0)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10, &(0x7f0000002800)=[{&(0x7f0000002700)="d94fa2996cf966ed05d924c36a120b7e4c1ed6318ee6c311453c5aac31ff770aa9541f53c4a35db2d3f507f4483a4e6dab20caa042df9e3a0b2ff1dcc2df1e84010ba830fbcff1d8ee45c373c0f6302782fa2e35f7cdc56ca0b3745a4a75ddb67dfc4b80d9e1c269280e024a9671e5f28cd8ac66c08ea7cd31f227c26f7e846665fb912322fd1241f932945cf27cc38c60f5b51564232507ad5798b110c6f3a231cd0157a51248cebe17ec66a42f38fd5ca6c3a04c6868be594c9d884de9e09f1de0d3a187efea9900fecd14f778b7", 0xcf}], 0x1, &(0x7f00000028c0)=[@sndinfo={0x20, 0x84, 0x2, {0x1000, 0x2, 0x3, 0x6, r2}}], 0x20, 0x20000004}, {&(0x7f0000002900)=@in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x15}, 0x1}, 0x1c, &(0x7f0000003980)=[{&(0x7f0000002940)="823d0b66445224393428a216b53b53b00a55d97f75c8107a01f325078172c9f3d7e65fb7aadf499b372403cb4d0667bf1d735ea86bd5", 0x36}, {&(0x7f0000002980)="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", 0x1000}], 0x2, &(0x7f00000039c0)=[@init={0x18, 0x84, 0x0, {0x0, 0x80, 0x869, 0x2}}, @authinfo={0x18, 0x84, 0x6, {0x5}}, @authinfo={0x18, 0x84, 0x6, {0x29}}, @authinfo={0x18, 0x84, 0x6, {0x3}}, @authinfo={0x18, 0x84, 0x6, {0x7ff}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}], 0x98, 0x40884}, {&(0x7f0000003a80)=@in6={0xa, 0x4e20, 0x7fffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}, 0x1c, &(0x7f0000004d80)=[{&(0x7f0000003ac0)="6b512e8997c9e47969ce0a42173bda6f5bbf55989fa4d45e3059279c0dbb4b", 0x1f}, {&(0x7f0000003b00)="876947c0e6c4aaf2737e5096118f1859433823160f649e3a46efe48b78cdb21a88ac764dc4dc11945cefe1668a4fea89eb9b3f55a75517cb47223ec680d212f03c53ae2ec254be23d1499bbb401a774f9cdac7a6fe47a09c96820ea3e46e4a8e0a621cc6f496ace3802865ba2f88ba775cdca31d85837cc7899387a6c5d1763df74f17d5e734df96486b7441fd68fde6aa503ef271bb4f6a7bb3fa6c8a472c9d6c0cb6ea4b4f9d150f0196c4b0800c586773d954e4692c056250428fb549799a4a312fef57ee6a2a14370fedc727f58d07431e7edff6c3bf52b89b1df6", 0xdd}, {&(0x7f0000003c00)="e0a3bb1bb503775db405ce225df81880b95e2676792653438775411cb6bb306310ef71e1c19a8cafa182d3e6f33caca06223aba30d6fe916abad98d7ef583629147511a785a37d", 0x47}, {&(0x7f0000003c80)="93af1b19f13e3abb5e48c4e2cd702b3fa8e3d756375254c55a9363a6c8a5c6f65ce43518c1619aa88ed2249d3d93dacc859668df6b3e", 0x36}, {&(0x7f0000003cc0)="c97a4e8283fdd450a9f68851b8dc9408dae24cde1e7ec5b05e1dcf278bf9b0d1728bba199bdfbcb5b57bcb57d36c498e90d15fb605ef150ccfccc7ab2d2e6261de4d43984226cc93b5e95556eb2b48f45980da99f5877bcf92ca3c65423d9153ce8bf9409fcf1486efee8992c08e5e4366a5b300c689a10ef353f44c59d2cc25424da9307454fb65047e4a3668c6571b20207164cd9913a957b3ef3b55df2779524ecefe8c3f347c7931aa4786f6c59d5c29fba5ff2ad1ac50c4a872ea0ebf9c1211a30dfb35749571441479ba41d04a59ae8a1256d615259dcf876b1fc7d28443c22eb0d8b2437a825232168ceaf4692ff293fff042d3b2a79083f649cbe1687497cf8fb1122b6296268138af766583662e1888c873e160c877a9a2da6452e2ccb7f4e13b0e5f2c3bae08591226380678c7a38560bd1d8235888ebb94271b7851e58f82884f8ad04de943164707f6096025eddf2ec5356f772333e3604d480fe8ef2cbd191eed36ff1b85b4c21ee1aed85107c0c93257ba4bc064c6890fa5342a9a844a4932fee30c5c50dbf6a910be97fd9d13ac274e67f04baae8a3757c42666fbd8773cf30d859d8c048a2c9b97b5dbb7bd460dd81c432c2aa4591b726b5f44a9425ba3739bf7477ba357a2e2c3e7b08d5635fb4d0928c84ae5c595efceb005d25e8c65ca4388296e707247eed49fd6a1571384df45f303e8395277c5cd62ac97e42a17316b9a5e43c24596d778476e481e63b5eab0252ee5cab4d24880d0909ab68c9ff06917be268e7dd95c39ba6af84650c7ab6430392e55aaed781cb691f8f484b571a01b84e4af0553cb6ee9dee22235d55d421392c558258b45ebf83aea771dd0215df660075ecbff55622f235ce4b3bdecf4b54ce4211ad73f0533a926ba39f85e80d3616183833d29d36058a5189395e3ecdafd3077e09590bee0bda95df3978ba045045a29514ec6ad6c24008b30eef9ec2a3963e0285331c870656fc1aa4756370b2bb546bd3f0fb8c5aa84b5aae5b452c1269c3130746536e8c243949b75b1ad510d6bb1722b1791d0b71c1f381da05fceb72d13de64bf74098cc68a1b16dca6e91da850a8cec1ab8ff256f7e6c721f667e4d562732180989961af27d1bb0f31c47676817ec1d6fe1bc941b013ede25a461024d88aeb019075dd4605c184ff5399536a87244a241b0bdfd1e808a1f09c2923c4493bb37a52a856c7ed33588b86a47bb6504f8bd38c5ed9c3670e4bf62de570fa24f5012d723dae7160a599b0b0af95c285538e679681add18cb60bd081e95c4d2ac604f4bee1b940ddad8c42f8cb7f2ea4e85ff626b14f9bac4a46fe83227842902e35cfb52c5eefe22d1fb269dde294a002166e2f5d80e17c54dfb30af311781de7a79242626def3958cad3e51886344babd1804eb6b2937e67106c20b20babf5e8c9ff3df8dc9f835c3b1b25fd4abba74079fc755fc13a1c97f3231fc303c2017c2b2a10f03934b29b5a63294dd3983d0565f5784926b7d5231ec427fa1f5c3c275e909703ee17ce25de317a73a480971069cfa1771724699aa0caf257719ccd0efa1786b7a3c40bff3a1d8aea6cf609e0033bb1b0f0652b931e08b0a59a466b32980ca41cf98040070eb50dec0bff780e514ad7ed25e4c228510de0f9cdfb7d62db9b1e288aa2664237bbfc06cdfb427e9163de8dc3db76a2fade569b80d754203e4bfe619bc6a97c7ba4e4f329d70e9f8397fed87943a3901a0477b6c203af87311b91d8743b1b64b350967c54a4fb5b117af29b078682df4cb7aed2590e14e14c80710c50109715f2c0a1351c250d34bf675b520967c0725617356f512ad40a72327cdacf82d453fe2a3e3b785a7f307bd3efcb74eeefa85fbd345fda14c8b17aacde3a9ccb535ad4cc152565d0ce673ef0715e100d5fdbd63df021a0c86f0bdfedd92e3da14f706757a4000fd2459bd09597891e9bbad32130757fcfdf693b70abc523501846e6a25fdd271c2bc53d0996287d6eb9a42df9590b1e00d48a630fe1b0a5333bb64717a4974464552fc796e6a6fe0a62ab1832c3d51fdb173705e8e40c2555a11edf3e8172d241e116d003baaad82502c4f562a98a55ed5edc1fbcf5c59d49e9e93d40caa41d8957572deec7ad4fba00f127454539e2b98f7af04fc05cbbebd5341f1235732e010df674e76341b0980c5ade0475e32977ac5333046493ba41eb84d034bff527f4012cfa78a1800dcc3be7a416f91d5fa3963216d2ce365daabe47aa7c34d5ca8415b0aa41b95390de1b2263c7057e20d16bc998667cf94deda3698af70c2b3aed4808d908453d9a685a3932a3772ab7c2015e60c5e185d0bdd13715364a7e59080ce4df20e8f4fbeb353b55baca49fc73584323dda09a16853cdf725f63ccafaea7f4f422b158c7c9acc6671209fc18d1215419df1dae4ab20651e525cdbe4205d4f73a31aa950c9a81443ce7ef271d18bd13beecb7d794586509c3aa70859655655d2d5a84e2fb821c023a4b21c47208f6ba22c90cf027e2104328d3315c07ee0c0e0c641e5e208762882eed78d103f5552e24c0d5d4dd773188d682f9791d00863bd6daf34d1cfdf58b9ed4ac76c72b93885e060a7a0438d7a09b04bd6571f4aef15381c5694de42d8d84622b172ec8a8f6fd2ab2b5b3a165211534783a8a55de90790fb1df02a5ae15bfa23c6b7c55c1528b1b752ffd1d4cae276ce1b2a3023141da34b5bcfabf9d7986c26a9a586dd0be5f7c0f2381b73e901011cfffbfcd41bf72144efeba13e508b5a04f857d781da3d4d20bef9679192d2dceb609fbeb26bd34af7696bce67cd98315ab3d8e117f1067d606ddf524d167e68cb5064338ddea2d550525464dfc93032ca58e967aefc86d1f1b2a1627485329dee27628c738be51196ffafa8a8d2885fcb841271f1511f6e07043a3d1a631c6b0504b12f51c3531ef6badf9e04c26eb700d5f666bdc95e8dc909096f6d722dc6988b9f01e82c17725a34a240539fee5e04e902ef17faf3113ee714523183cafc9d549282cbf1dde606c634db00c43359b17a1b226a911a4dd936c10ee3a8e4a7fa7545f8d82bbcb2c9b72ec28f4f0c5208a416649444814987b0357b90747e5cb98352e6e2e7af018cf9ff19ce9a257159ff0d11b86ea15ef0d8cec5d7d700fb1db8a62b570e6ac1a1f9647e0a24bc0a4e97ddc0d498773262547549e1d821fcd93f4458b064e3140db02b93a503712b0d6a1899b7bf1b7cdef1bba732d7ee266f9553d3e6fd3fb1e77e2f3b2fdbf7533dafb574a2b428d6eb7babd00ec625e43bafa570c165f5391857cee2525d319a5d76d63c008db11e9b6f0066efa1fd15bf5a3a4cbc909f07dbf9c22a309117e0e2dfac2e6d8b59a7415cb3c445862d2273c468e2aff7c035f720f08a7ab472a189ae94e7d5ae3deb43549ea8f38d2c62f0424a238628fec982ab05a1679c962e6e66e7ff315e0b1d5a6afbbb3c9900572860c46053aa7d9e9f1c8f785368baa10e2c6fdd7652ba5b2ce833156ce0ed6df401a46afbbffe9d7be00329a633d123c1d57e024180bf2214a0ca3949ed9b8b2579c800d4f13cc28d32006f207a4447a67ec62164955ca30745cb9f7ca7058e2b0867edb5afe05f6cc993f9f8bd32f31ec66dd4ae244b5f70e0e5c0ce02b7e3b4dd6e67e075fe1f405749129da6f87f981391bd61c7e355a6f8a91bf9d1c5fdebc1a9631ba2620270efd4e02f1fd3c76ea8c1e948436191b97d5b36b0622e0507446c1fb9529cf0a7f1045c96cde6f8a686365934cf66c73a315d0aee961f78a63bdde6ab28cc34a623f3a26a62442d37e6a908ece5b5c8d38b1a731394622eba0d68d02c48d06552fcab4e5b2bf804412b50db5b47bcbb86b46ec1fb1d6458f5a0ae3bce5438c12261c433d99f399fe70f240ffc150dd8d33defe6d18bdacc9807cd572dfd3289d942635a885640a32f3cdd5d44563ac473c2ad90e49fd7fecaf965a8091496e99d065e9a39a2185e8d381a205b570ed1383a8f6bd1f8b84facc5f1c5e318e6ec58d45ff0e58a0c067a919d42ff57a86073b6a02bebbea3d1bfdc6b412245dcf005d28b4f1e6afcd268045b6123361f41f42c9707b71e45425dc17ca7e687f5480fe9b98b11a7b56cb4bcb90fd3e229876b52c11223bcb221a84cf6f7be29087f1e0814af681f317def7c78dd745c4768a4a689e24467780487723265988cec91c195b64a042b74450d663cd65b85f012c105c0f0d5894d6bc9aa0e00d21b7cb3db763ee9756ebfed068a8884e90c407c15c009b8c105022ae23233ab37fbdf9083d9de568267ba49328006feb5381a8cf4d4fea0f488ae6903f39d3007c1f4dae0033a01f89f40e52a3ad6dbfac36fc3d1d01bcb7a270f0d6031a315df5af58ab23b63359ea31b7a242bc83345a33bfa8d230da8de8016327f429172333c1a35937425c0a63006494f85fecfd77ee8e335d17107f624f927dbcff1111004968b0a87268fc5e9116408ca962acc31e66528f5a9878dc98a694923239985d2016adfb5655fb91b3b4b343a0957bfa27faf77c8240e802d1d1d3f98e09380d65fb8587886b802172fe6ac485b7ba9f91da60e1dcc67ad33307b8a7a86f529f8759704c66157bebb82f4f2ff0342cf39e3b7e539812d8095e66629e47134acb641e69f0963741a05333a118b3a2090edc3b31b9d4cf2eae59574569b503347869e6c899f2359ccec8cef9453cef878c37c7a8e4fc4361f5cf73686d975a530338491259504f56ab3c7f71d85409f2bed32c8c8a22234c1796fb481f182f530772c143cf17d96fe1e24456e5da0d6c86e008ef7400409607d2ed143b42e07e46e6785ea946babaa0e82865ff5ef4d681ed5cfc599f3f7877d38be2afa8f7943b21e3e3a87e68f1299cf05fbe66523f12d3375207fe1511d5cecfa27a07b2b9c9c928581031743787d0085219afa03caa01753e4ef803dd648598ca828f042029e412d8fc8a8de0f639fe53743895ad85280e1eac6d9841370dd2a41e8f7c26bd8b801c0f9e9e94cb212d5e2a1c1e591f31ee58c29eba7db9309baad44f1d2ac7c7e8448d2e8511d5f2ba3db9271acb838985f714a8ff9e319585599a254a114f57658f1cd3939a4de4afec00f5d5fb270b09a512f4ec5fa6ddea92a5030789a0a7db5a2a7f8a59c7bc2a13488f0372e4b0420e93a92721fac8727390c8da797bd49e1913242fca8a063580b199028cb53323956055fe6d2b91ce3b8020bcfa75da8880b29cf919aa2f85ce9f22dd51c7eacab614830c41028cc4f488c58995f0c62c6e94540888124a63b80267053aa8580c756f20a0e6772a5db5513ab0a07612b22db0a7e4527e8ac62573e53bc74e9036a23394f35a899cde9085bdd0e2cd9bc5f975025929f4fbc11644a40b664ea8730cae4076a1769cf516ec23442bbf0ac765e13e1eebe0b7ab60309bf9accca228da2153996844edab51d61889aa42ed09d26d3a14eb5650e4a559de423daf7ac5c9273fab9cf8b4573e232430a15f35650a3b5a369cb2ea7ef356470c0655ebd9953ef99e38b31f0193d84bb38bdccb78dc00d945e5fac9c1c7b0704056b1437d83055696159a0d6ea3281bfc15c4fe557ce5bfaca9a9ab13968f8a236bdd926712a2d5d900b0956794e6be85d4d4993e99cdfde2ee3346e3bace8622108609a5a07ee4fa005aff5e9f0ae2d54c2110b6a5cc29eb41deaf804d145611429dd30f1bcce0205c360a7d65ce7b8966e92273df209c861cf779fc8cf6d7ecf3b5f4fdcdf79a1", 0x1000}, {&(0x7f0000004cc0)="4ae4b1e076dd53f76f0933e12780e718eff1ec68c6ffe3d3439066de51b836189822dff34bc2390ef8b2554af448f9233312f9a6bb60ed2410ba63ff57b5bf92904f334c6050fb93f86c557b5d476be1602714a417d4fe34d9e3798f5c7ffcd4e8543326371d3de4e3066b3b40b742b6d5cbabae317370562c29d74f077878b70236bed0a918fae16d29a5", 0x8b}], 0x6, &(0x7f0000005040)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @sndinfo={0x20, 0x84, 0x2, {0x8, 0x8, 0x3, 0x3e, r3}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x2, 0x800c, 0x3, 0x5, 0x8, 0x100, 0x10000000000000, r4}}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr="c6fc3eef8ff38cf444049873ce600ef5"}, @sndinfo={0x20, 0x84, 0x2, {0xfffffffffffffffe, 0xc, 0x80, 0x6, r5}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x800}}], 0xd8, 0x80}], 0x5, 0x4000001) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="5e8d0000000000008400000002000000000041020000000000000000", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) [ 364.071233][T19164] fuse: Unknown parameter 'defaulT_permissions' [ 364.107058][T19171] fuse: Unknown parameter 'defaulT_pessions' 01:22:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 364.183208][T19174] fuse: Unknown parameter 'defaulT_permissions' 01:22:08 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 01:22:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 364.257576][T19181] autofs4:pid:19181:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.104), cmd(0x0000937e) [ 364.291384][T19181] autofs4:pid:19181:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:08 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, 0x0) 01:22:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe77, 0x0, 0x184, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0xfffffffffffffd94, 0xc014}, 0x1) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:08 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="010000006c0000007f") 01:22:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:22:08 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 01:22:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x7, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x74) [ 364.683312][T19207] autofs4:pid:19207:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.108), cmd(0x0000937e) [ 364.698374][T19207] autofs4:pid:19207:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:22:08 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, 0x0) 01:22:08 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 01:22:08 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000740000007f") 01:22:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x1, 0x2) sendmsg$inet_sctp(r1, &(0x7f0000000200)={0x0, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="181a0000000000008400000005000000ff03000000000000"], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)=0x0) ptrace$setregset(0x4205, r2, 0x203, &(0x7f00000001c0)={&(0x7f0000000300)="771796bc7e043f1df86a491400c792974130e7b70f8ab77a92310569acae45a858643bdd7d40cfdc1004eae837af4dca6435734033c3d336de60bdbb4efbfcce1be7530c71615bb43c722839528a364a9fc7905b88252908bb622d1c699f1fae60b2286081a28575126b0170da5d82394f311deb7dd0aed8320b6245469c99a29e6f1f6f11cd1b3d4d3a93a296d8836193eedd3b8f5c008ef38d91ecdb69e4", 0x9f}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000)='.bdev#em0\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000140)=r3) 01:22:08 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x0, 0x0}) 01:22:08 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e4"]) [ 365.077290][T19238] autofs4:pid:19238:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.116), cmd(0x0000937e) 01:22:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001440)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000001540)=0xc) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001580)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5d23d408}}], [{@euid_gt={'euid>', r3}}, {@fowner_gt={'fowner>', r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x75, 0x31, 0x62, 0x64, 0x61, 0x7f, 0x33], 0x2d, [0x77, 0x0, 0x36, 0x34], 0x2d, [0x33, 0x0, 0x77, 0x61], 0x2d, [0x77, 0x77, 0x77, 0x36], 0x2d, [0x65, 0x65, 0x7d, 0x33, 0x64, 0x0, 0x76, 0x38]}}}, {@hash='hash'}, {@fowner_gt={'fowner>', r3}}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:22:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 365.201007][T19238] autofs4:pid:19238:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:09 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000040)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r1, 0x5}, &(0x7f0000000200)=0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r2, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:09 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="010000007a0000007f") 01:22:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:22:09 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c545f70657373696f6e732c00000000e6e4"]) 01:22:09 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x0, 0x0}) [ 365.403794][T19257] fuse: Unknown parameter 'euid>00000000000000000000' [ 365.508223][T19262] fuse: Unknown parameter 'euid>00000000000000000000' 01:22:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x100004000003, 0x44400) sendmmsg$inet_sctp(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0x4f, "0e8b6b0482e89bdd74e21b7ddd70006f9e6f00b8798a655b9bfb9dc1b0fdbcca849c23c73cf627f28251e1541a0ebb9a9e25203b9bf2c200aaf13ab2b0e2956c0da5a2414f6bee5cc23e89f3237c20"}, &(0x7f0000000280)=0x57) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x5, 0x9ec, 0x200, 0x7, 0xffffffffffff7fff}, 0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000300)={r3, 0x5, 0x4, 0x200}, 0x10) 01:22:09 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000002c0)=0xf002) getpgid(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)='moinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x49, 0x80) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f1663851b7484edf31009ad7079643d", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) read$FUSE(r3, &(0x7f0000000440), 0x263) fchmodat(r2, &(0x7f0000000000)='./file0\x00', 0x95) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000300)={0x6, 0xb, 0x4, 0x400, {0x0, 0x2710}, {0x2, 0xc, 0xe000000000000000, 0x1299db39, 0x800, 0x3f, "1505c212"}, 0x1, 0x3, @offset=0x42b0, 0x4}) creat(&(0x7f0000000040)='./file0\x00', 0x20) [ 365.602760][T19274] autofs4:pid:19274:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.122), cmd(0x0000937e) [ 365.629321][T19273] fuse: Unknown parameter 'defaulT_pessions' 01:22:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 365.672049][T19274] autofs4:pid:19274:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:09 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',']) 01:22:09 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x0, 0x0}) 01:22:09 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000ff0000007f") 01:22:09 executing program 5: userfaultfd(0x800) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="680bf4a80000000f00"], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 365.879893][T19285] fuse: Unknown parameter 'group_c…t„íó ­pyd' 01:22:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 365.976196][T19294] fuse: Unknown parameter 'group_c…t„íó ­pyd' 01:22:09 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',']) 01:22:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5b, 0x202) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:22:09 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x0, &(0x7f0000000200)}) [ 366.084125][T19301] autofs4:pid:19301:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.255), cmd(0x0000937e) [ 366.110221][T19301] autofs4:pid:19301:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="822300000000f7000084000000020000000000410200000000000000", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) 01:22:10 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000001007f") 01:22:10 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',']) 01:22:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:22:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000040)={0xfffffffffffffff9, 0x9, 0x8004, 0x1, 0x401, 0xede, 0x9, 0x100, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000001c0)={r1, 0x7ca}, 0x8) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="200000000000e5ff8300000002000000000041020000000000000000", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80, 0x0) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f0000000200)={0x1000, 0x2, 0xffffffffffffff34}) 01:22:10 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x0, &(0x7f0000000200)}) 01:22:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r0, 0x0, 0x3}, 0x10) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 366.492352][T19329] autofs4:pid:19329:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.65536), cmd(0x0000937e) 01:22:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 366.564106][T19329] autofs4:pid:19329:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:10 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',defaulT_pess']) 01:22:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f00000001c0)={0x7, 0x7, {0x52, 0x9, 0x2, {0x7a0, 0xc1}, {0x40, 0x3}, @ramp={0x7, 0x7, {0x9, 0x0, 0x4, 0x4}}}, {0x54, 0x401, 0x1, {0x3, 0x7ff}, {0xff, 0x3}, @rumble={0x506, 0xc1}}}) 01:22:10 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSPASS(r1, 0x40107446, &(0x7f0000000400)={0x0, &(0x7f0000000200)}) 01:22:10 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000002007f") 01:22:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 366.829170][T19348] fuse: Unknown parameter 'defaulT_pess' 01:22:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000500)={@dev, @remote}, &(0x7f0000000540)=0x8) read$FUSE(r0, &(0x7f0000003780), 0xfffffd18) r2 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000002c0)="846fc44eccb548f9d93c4c8068ac82ea36cf83c1c899825be01f6326a0f34cbcff04b9ce63afa62c5020e0285873825c328add94346d878700bfa44762ceb226c553d540072f2528b34576ba836a490ab9193abc46b582a09190c45f7d1621637fe582e696983dfcc03818a8174ea814842d8c1e1c2fad8248aac34cf8fee816868ea19c738862ca2bc03175594a7c11ab4eaefd2e1e15f77cf6503d9e68077023b1e32c4ed5e46dbd2082182bd786385cef69a67970d8e1b5caa621d6ef0ac656ef05a3a515254e9096a4261e3841e7c3849fd2503713b0c8473bfff5", 0xdd, 0xfffffffffffffffb) r4 = add_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)="e88fe5fe6b6f06e5c782be1be723411042a58141766e7896156585f1b8be6c1c72c7fef6892a251dada00a42b76e3b21cbaf29561910a15c0b2b0a832a73e7f7a49732282c19ba2a0eda15b5f08d25aab4a9d6b602c469615fabefc8e900a2a5ae0edf778025df3f4fa408d30aa493e828c7cc312b5bf564b8287fb009ec598aebee888eb6b731b00b91594338e1c6ddc8b501ed3cbf2f79e4abb6af0fe9711986150b5b5667d59e82e7e923ba5f82d3be34da8cb44076ae61694d184aba7ba9a9d624de5f", 0xc5, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0x1e, r2, r3, r4, 0x0) 01:22:10 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',d']) [ 366.986081][T19359] autofs4:pid:19359:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.131072), cmd(0x0000937e) [ 367.043058][T19359] autofs4:pid:19359:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:10 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x0, 0x100) write$vnet(r0, &(0x7f0000000300)={0x1, {&(0x7f0000000240)=""/94, 0x5e, &(0x7f00000002c0)=""/29, 0x1, 0x3}}, 0x68) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x100, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000000c0)=0x100000001, &(0x7f0000000100)=0x2) r2 = socket$inet6_sctp(0xa, 0xc, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0xfffffffffffffd44, 0x1}, 0x0) sendmmsg$inet_sctp(r2, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 367.090088][T19366] fuse: Unknown parameter 'd' 01:22:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:22:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) r2 = getgid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) r3 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x40008, &(0x7f0000001880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000001}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@seclabel='seclabel'}, {@euid_lt={'euid<', r3}}, {@euid_lt={'euid<', r4}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<', r6}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:22:11 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 01:22:11 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000003007f") [ 367.379781][T19387] autofs4:pid:19387:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.196608), cmd(0x0000937e) 01:22:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000040)) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:22:11 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f0000000140)={0x80000001, 0x4960, 0x56cb}) r2 = syz_open_procfs(r0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r2, &(0x7f0000002780), 0xf5) [ 367.426130][T19374] fuse: Unknown parameter 'obj_role' 01:22:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) r2 = getgid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) r3 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x40008, &(0x7f0000001880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000001}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@seclabel='seclabel'}, {@euid_lt={'euid<', r3}}, {@euid_lt={'euid<', r4}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<', r6}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:22:11 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) [ 367.481655][T19387] autofs4:pid:19387:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 01:22:11 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000004007f") 01:22:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) io_setup(0x2f, &(0x7f0000000000)=0x0) r2 = dup(r0) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x0, 0x800) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001340)='/dev/sequencer2\x00', 0x400, 0x0) r5 = syz_open_dev$swradio(&(0x7f0000001480)='/dev/swradio#\x00', 0x0, 0x2) r6 = syz_open_dev$sndpcmp(&(0x7f0000001600)='/dev/snd/pcmC#D#p\x00', 0x20, 0x0) io_submit(r1, 0x5, &(0x7f0000001680)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0xd, 0x2, r0, &(0x7f00000001c0)="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", 0x1000, 0x8, 0x0, 0x1, r2}, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x8, 0x800, r0, &(0x7f00000011c0)="de458708f344451965f7de272f31ff8d5b6bd1459041b8274319eb0a82055b4ffbe7e9975205f67408b31aab1c0ddf6b430a305dde301d47a27ceda9c2a10c13184cc81d3c0b864640bbad24f372d15ae7f32ebed92ccc62b3ed4a2462ce084d3ce7f4c229b705646b1764c8accc4468514a444df13606eaf49e82e766821af3abc806d67dfccaaf3262953a01d954b27564abb2923f62fe54b89d71d707d13ab97bef4baea82eee3cd82fe5773782d836dc78664fb3a7d1278a94c98c041735ebb9361321b651cf1992c5632f815d78537e6739c578c2b40a", 0xd9, 0x4, 0x0, 0x0, r3}, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x5, r0, &(0x7f0000001300)="8f3e51c8e618f4f6f21165175107b07001c2480ddb0984f91a110b2025990197504fc215", 0x24, 0x5, 0x0, 0x0, r4}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x7, 0x7, r0, &(0x7f00000013c0)="3e08f5c0664c2e305763bf828f642ffaef6e9f5258e5481dd65d954580e61ccd19e81bab212f271deeec3d99da48904eb16c51181549d4508ad9a29d7176d180010c3dbf5c92500e2ddb2bcb18c479d3e5a23968c5b36b32951c4ae373c19a7a2f588073777d729b0b152a575245bb688cf4c4dda36dc0858e6b6df087d040637941de2c16e4ed05af82e187f6a5d37a6a467e3eb882634183e15275b7380a1e286c2d9df50d02a972ab88fff2aeec0f", 0xb0, 0x7, 0x0, 0x2, r5}, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffb, r0, &(0x7f0000001500)="cb8bab7dd8427f6a0a44abfef7d11fe55dda3721a0892aa068493a182a0d3da09a8a4d0043be5e51d8a2e939475e7c798be2b24ef236e75c08afb64c0b624f2adb236e2f4f466527dfa224354305a069427582f861e398724a40fbfd8dc7450d41879e5f785d6348724108f86e43f52a44773748bf570f8a51886a36f6af7cdcb9dbb05fea6ddca334cdfbd79dccd82cdcc69b02df44ef0bf427e0ba10bcb5cda88ea8ee32ad40da3160e62f78f9609f81a25c4e1d7ce208d9d7ea57173935ef218aa8c632153201d98b8796e863a1ea519c8140", 0xd4, 0x4, 0x0, 0x3, r6}]) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e23, @multicast1}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x0, {0x2, 0x4e23, @broadcast}, 'caif0\x00'}) read$FUSE(r0, &(0x7f0000000440), 0x1000) ioctl(r0, 0x100000001, &(0x7f0000000100)="94401b69718d0d4ab622a0505e4a28312773430ee02ac685126afddb94bf7afe1c8bd00cb455f5da636cea8f66b3873c15c8dec973fdc6eb5d43ba523835e207529033eacdc5951451bb5de96f74c3c0ef1d2c0e856135afc5eec71d3b817f1b1b143d6b536dc4189b0e7a7b900f54d20772c0e6633aae3a602c8f6cbd1b5c3461e6b4a2dc1bc556f7ed3e4bd2f17e3cf50d4cd9506103d91d8367e7") 01:22:11 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 01:22:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 367.875584][T19408] fuse: Unknown parameter 'obj_role' [ 367.909733][T19418] autofs4:pid:19418:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.262144), cmd(0x0000937e) 01:22:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) r2 = getgid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) r3 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x40008, &(0x7f0000001880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000001}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@seclabel='seclabel'}, {@euid_lt={'euid<', r3}}, {@euid_lt={'euid<', r4}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<', r6}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 367.964701][T19418] autofs4:pid:19418:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:11 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000005007f") 01:22:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x2}}], 0x2, 0x0, 0x0) 01:22:11 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',']) 01:22:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x10001}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x3000000000000000, 0x0, 0x0, 0xff, 0xac3, 0x9, 0x7, 0x0, r1}, 0x20) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x1000000000000051, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x400000) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000040)=0xc14b) 01:22:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_\x00\brmi\x00']) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 368.235008][T19437] autofs4:pid:19437:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.327680), cmd(0x0000937e) [ 368.262097][T19432] fuse: Unknown parameter 'obj_role' 01:22:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) r2 = getgid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) r3 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x40008, &(0x7f0000001880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000001}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@seclabel='seclabel'}, {@euid_lt={'euid<', r3}}, {@euid_lt={'euid<', r4}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<', r6}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) [ 368.299283][T19437] autofs4:pid:19437:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:12 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000006007f") [ 368.516589][T19454] fuse: Unknown parameter 'default_' 01:22:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x4}}], 0x2, 0x0, 0x0) 01:22:12 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',']) [ 368.580472][T19454] fuse: Unknown parameter 'default_' [ 368.587421][T19455] fuse: Unknown parameter 'obj_role' [ 368.612612][T19458] autofs4:pid:19458:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.393216), cmd(0x0000937e) 01:22:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x2000) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='=\x00\x00', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:22:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x8, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) r2 = getgid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) r3 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x40008, &(0x7f0000001880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000001}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@seclabel='seclabel'}, {@euid_lt={'euid<', r3}}, {@euid_lt={'euid<', r4}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) [ 368.725454][T19458] autofs4:pid:19458:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:12 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000007007f") 01:22:12 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',']) [ 368.843941][T19474] fuse: Missing mount parameter(s) 01:22:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x7}}], 0x2, 0x0, 0x0) [ 368.952923][T19482] fuse: Missing mount parameter(s) [ 369.025535][T19490] autofs4:pid:19490:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.458752), cmd(0x0000937e) 01:22:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="20000000000000008400000002000000000541020000000000000000", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$nfc_llcp(r2, 0x0, &(0x7f0000000280), 0x80800) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x101, 0x100) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f00000001c0)={r4, 0x2, 0x20, 0x26c9, 0x7fffffff}, &(0x7f0000000200)=0x18) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000002c0)={0x7, 0x1f, 0x8, 0x1}, 0x6) 01:22:12 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69e43d", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) read$FUSE(r1, &(0x7f0000000440), 0x1000) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000000)='rose0\x00') 01:22:12 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000008007f") [ 369.067116][T19490] autofs4:pid:19490:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 369.101292][T19487] fuse: Unknown parameter 'obj_role' 01:22:12 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',d']) 01:22:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x38}}], 0x2, 0x0, 0x0) 01:22:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) r2 = getgid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) r3 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x40008, &(0x7f0000001880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000001}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@seclabel='seclabel'}, {@euid_lt={'euid<', r3}}, {@euid_lt={'euid<', r4}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x250000) getpeername$ax25(r1, &(0x7f00000001c0)={{0x3, @rose}, [@remote, @rose, @default, @bcast, @null, @rose, @rose, @bcast]}, &(0x7f0000000040)=0x48) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 369.299791][T19504] fuse: Unknown parameter 'group_iä' [ 369.318352][T19507] autofs4:pid:19507:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.524288), cmd(0x0000937e) [ 369.361650][T19510] fuse: Unknown parameter 'group_iä' 01:22:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r0, 0x0, 0x2, &(0x7f0000000140)='fd', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r2, r0, 0x0, 0x1, &(0x7f0000000100)='\x00', r3}, 0x30) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x100, 0x0) [ 369.417853][T19507] autofs4:pid:19507:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 369.444106][T19514] fuse: Bad value for 'fd' 01:22:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x3c8}}], 0x2, 0x0, 0x0) 01:22:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) r2 = getgid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) r3 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x40008, &(0x7f0000001880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000001}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@seclabel='seclabel'}, {@euid_lt={'euid<', r3}}, {@euid_lt={'euid<', r4}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) [ 369.489264][T19516] fuse: Bad value for 'group_id' 01:22:13 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000020007f") 01:22:13 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x40) sendmsg$inet_sctp(r0, &(0x7f00000005c0)={&(0x7f0000000040)=@in={0x2, 0x8, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f0000000140)="2ec028e807e378251a2a8e89b87d0cfc1b1c71893fb3f2a89dfb2733ec857899acf8c274c1fa97737ca9c4951feeaa747725c8123e459ee5593922ee21fc9c4ea80018bc67be7d8668267bcf0576bd183fc39ba73c716569e1208381536232db500cde057f3a2e04e15a391efe9894229b7b05f2de562496f38ccbfaf78e501cd3769e4a6b9c75572ef24279400c5275b04dc7afc9add11bd9a27bfef10ab6", 0x9f}, {&(0x7f0000000200)="6706ab7385532fbc6b8eba05bfc6bc68c461884e4f5fa8823d47dc0ed1890bcf02ed3c29738368c543f38c8ded6a9c531333ffeb10e07273e0cd17e83cad4b6b29d66d4127df04647a107f3af14f52cb3214c494f02586caee55b3521bbf15252b50d9b5437479bbce3aeed6f4c0951011e38841d36707cad2911a57b16c17d3f74dd3f3cb039cb5604a949902f181008df9", 0x92}, {&(0x7f00000002c0)="dcbf7624d7080ea64258b9b817eec8a094fd1e357a73e787723d4aa97ebb01f6f5c7ffa81180f9e2243dbda0ff6f08ebf262c6c7a3d20c6c076781c83833af4254d015958f5628cfbded20f205828128be596950654ed4f6483b209a689dae8d648a3ea1a9ac06c3abd962d9bc387ab4413f7088018d988dc6525444c907d38e438a6e771417e8795b129e8a65b876b3333d71cc8cbdc78161f8dc413dc211b50976c4886c3d2866", 0xa8}, {&(0x7f0000000080)="e38b14f9390a953e4fb882894a467e68b2fb7070d46309cfa4766791318255d028b6fa75cda888cf3afd32d9a1a3dd7fd28497f4", 0x34}, {&(0x7f0000000380)="c618424a7846254c6ee6ee5c2d29499c365547c7a606b64b49e47ab3f1726ebf0ea607eb5f4fc414684af35166ba31592d102a141b65a814542459a36cec85d71627f0314a86b5326533b161342710205588608e8cf5fe41af46e0b361b088ee8af9b4294ba619ff29f689", 0xfffffffffffffdcb}, {&(0x7f0000000400)="befe95aab57d019c47e2b632304b206681f87b587162eb239e4853dc01271a35f68a", 0x22}, {&(0x7f0000000440)="206a1f036f7409152d9ee39661c2f1db63c073ddd2305ac40435d86f9ec38c76acab0b14d7179068bbdc0ca6bf096bc41a0de354d79726adda3869e4fbb83dc9788f9d179da2e4ad39e51513ad113c40c239d437d9e66f5e6ef5c3041f755e5e7b2758edea1932b10549d5752ac616160c0463ad72df6c0eae0b7720cfaeb9a4cf38e2e3795fa1e5da6d0d9cbd7c046d3003545121751f52bbdbd077d2391e2641ddaea19047", 0xa6}], 0x7, &(0x7f0000000640)=[@dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @empty}}], 0x20, 0x10}, 0x20000000) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000600)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) 01:22:13 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',d']) [ 369.659772][T19531] autofs4:pid:19531:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.2097152), cmd(0x0000937e) 01:22:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) accept4$nfc_llcp(r0, &(0x7f0000000000), &(0x7f0000000100)=0x60, 0x80800) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 369.773973][T19539] fuse: Bad value for 'fd' [ 369.778589][T19531] autofs4:pid:19531:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 369.810662][T19542] fuse: Bad value for 'group_id' 01:22:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x700}}], 0x2, 0x0, 0x0) 01:22:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000009bde670b4828970d2000000000000000a8fdaac3506cb5c168f38ccadf1ffa7c4416f539a0ed1d5aba5f29702e1798289bc517b8ca9641306b57ac4ed3cb653a6c9d04a126f1183cbe7732105f4dd089b9540ba817b72fc5679991995d42da11838c5bd511432b0f283046d7f4238e76fbdf5a6781bd9c03000899791984213ca248e8afc3c7b86bae9c3966f8bd608bc716121e1813cf180c437a180cfed68c1c0afa2979251a03224f225ddc3fb0f3"], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="20000000000010008400007631fd394d7297897546f5826a8c750002000000000041020000000000000000649f2df6cb58ea5d60e8f2d198031d10fcf532178ea0028e5cc01074791e1991465c2866c4e8cfc7db5f9a688d73468aa9853352e39e7c3b7779775f1d27ed2654833612ca13e7f752d3de8d655cd95069f835c91d13eae39b66100f6eba9910561f7471ffc45b67", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000740)={&(0x7f0000000040)=@in={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000280)="7090c2903eda4677b086b7725f0472b9fe778554ea14103545b59e1ed2b8f9a0c53cf3c6f04c2c59e89b8e0d4c588aad33a6e81c7e3865313bae4abff64556b7b2b00b46ec245ce456bfed9cf05090648075d8530c010f464d80ce28cb594925f4718ee4718d7bc71d2816df9f90c61ca332cd2a2e31517e93a61a9601cf0b07f027dacfa17fd055dc8f0f8fe8c60556249b589605883e2fe9cfe53bc44caf68fa6933516593e16881d0a5bcaf9e72517326de905e26fb31438254ee3fabec838d8dbb0b8388177511758a4c2ed257e6e2b4ac0a", 0xd4}, {&(0x7f0000000140)="fe0d3621510a5a821cde3bc8345f3c1c52", 0x11}, {&(0x7f0000000380)="c2e13df3b061f767894810a7222093866b4d2760fd09259bf42725b4174df7c0cbb223b92932df8686945e50a5d52bad0f604a1ea56a03c15aca15da264c52b901cb459765ae73486ae6bffae5feb8d371f1c5b82b930d13f6b83bb4699e6bb29e1018ba75096e8bdcbdbf5d7a0a979c9c3e81980d7307b864940849920acab0a9a3999aee2403596e4ab232ccdde44f22fb66d40fd796676958092438224ce613a3d3080821c4a5401de0cea4e22abb4bb7025329c8bd77ff793aababe2acf32a30c5e77d8af255e9b604c1d833daba031d989144e97644ee8c535913bfe485e2", 0xe1}, {&(0x7f0000000480)="60fcaba64c51dfb17e3afa4551288d6dbf7455fa37b3f20b63e2acb38b4a3f23a02fc81e649a6f4c8b0d557d37e156aff274bd5f037e6bad090cf0cfc2e3c79ec01a3112c149aa5bc6e22648c0f13e4169a064dcbfd307f5d91a1c21307aecbf9e9191bc3d6db10c2dfa2bdf1f5d55f9b594ced75d59cb1715dccbee5d2f0a21a3e172218b999348e9f194e5fc71cbec2a06cbffcab704370d01c20afca0b13a9684f85ca279a43d8f48a8e883619c3a5f2a17c949ba770b1a676c", 0xbb}, {&(0x7f0000000540)="851408b5c0b2e6a1bd3a60e66d0bdd58f98abbb82d0a926479c52463cfc6ac9c4766d49fa01084008980f92cb0d5be8379ebdcef18d7c77631ccdf014ab95a93e3b43477b6a17220ded2edb9d97a86b25708ac88d77b48cc21348e0e4a892e182ee4915bccec00c0f222f433c7e777d7f9a81e0a631a84f77cd7", 0x7a}, {&(0x7f00000005c0)="112dd654a72318534dbd2a799cf18c61df0f6dcf4a2b4dd63d964a60206d3c6c7376924825231e4d6e4997e50503103c6d2b8bfc099dd959c51c7a8a04c89adcedc15d50065bacfb58206e00ed38a963373c848f072bc97d6648b04eab96e1b15f97202af51e098c51942907aa0c39aed26a46bf56a49a455327b854cb89e102a9b4c8f802e8d27381b009b55d0ad33bdde36032b1a715c9b76a225627d9cb980c1bf5136f94294309c852c2f4cfbc006b042e", 0xb3}], 0x6, &(0x7f0000000700), 0x0, 0x40080}, 0x81) 01:22:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) r2 = getgid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) r3 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x40008, &(0x7f0000001880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000001}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@seclabel='seclabel'}, {@euid_lt={'euid<', r3}}, {@euid_lt={'euid<', r4}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:13 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',d']) 01:22:13 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000040007f") 01:22:13 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000003780), 0xfffffec2) [ 370.144471][T19563] fuse: Bad value for 'group_id' [ 370.153866][T19561] fuse: Bad value for 'fd' [ 370.155993][T19566] autofs4:pid:19566:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.4194304), cmd(0x0000937e) 01:22:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x3800}}], 0x2, 0x0, 0x0) 01:22:14 executing program 5: r0 = syz_open_dev$vbi(0xfffffffffffffffe, 0x3, 0x2) sendmsg$inet_sctp(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffff9, &(0x7f0000000000)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0xfffffffffffffe08}, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 370.205295][T19566] autofs4:pid:19566:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:14 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) r2 = getgid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) r3 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x40008, &(0x7f0000001880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000001}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@seclabel='seclabel'}, {@euid_lt={'euid<', r3}}, {@euid_lt={'euid<', r4}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:14 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000048007f") 01:22:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="752d70e3d01fe8bb606753672014583fbe8cb94c3d150bdd59e37892e5094c4f8baca8876b176d321931e106e983ab7c515a7bff65fc951476134e7dc722c50e4683718b3f946b03e66dfad899d61a9c8033369d6d5ef0cf1fd19998dcafd9753c2fcdf24a03fbf9162420e008a55197ea1f138f3986dcde75b799ee844d32951776e7a5a0616a4bef5d1465059863a9ed1fbd0a16455bae62fd185f7c4a3bccd10000", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:22:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x4000}}], 0x2, 0x0, 0x0) 01:22:14 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80080, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000022c0)={0x0, @in6={{0xa, 0x4e23, 0x8000, @remote, 0x81}}, 0x1f, 0x18}, &(0x7f0000002380)=0x90) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000005c00)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000005c40)=0x1c) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000072c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000007300)=0x10) ioctl$KDADDIO(r0, 0x4b34, 0x7f) sendmmsg$inet_sctp(r0, &(0x7f00000073c0)=[{&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x0, @remote, 0xbc1}, 0x1c, &(0x7f0000002280)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f0000000140)}, {&(0x7f00000011c0)="daa652b7dcaefecbe88e45cc4a441c0d2cc69cdc382c0e4333528f21ee9b386b54b2c13b09cc27f44e40b43f9759f14576d17ea6b1e89d8a56ac43dc2512a7e4e7067a1444dea5bd00969226b59e440f9bddd8b89c902ed4a70b6162221884762c8cce16d069b8e3d46949cac5acefa5cc13394bdf0cbbb910a9a711f0b3d35a52a9ad22bc08d124c30cba6185cb7075a78d920ce7cece70a11a530642ce68214a97c24008d18ded04709f2b423da4", 0xaf}, {&(0x7f0000001280)="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", 0x1000}], 0x4, &(0x7f00000023c0)=[@dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @rand_addr=0x9}}, @authinfo={0x18, 0x84, 0x6, {0x2}}, @sndrcv={0x30, 0x84, 0x1, {0x400, 0x6d5f, 0x200, 0xcd, 0x4, 0x3, 0x6, 0xfffffffffffffff7, r1}}], 0x68, 0x95d96cc63003f330}, {&(0x7f0000002440)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000005840)=[{&(0x7f0000002480)="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", 0x1000}, {&(0x7f0000003480)="2767865b1f5028b75edb1f664f175e94b6a1c4e7899dd719b2b71b09", 0x1c}, {&(0x7f00000034c0)="9d1931d50e9a0ad70e5322240ab6832b4d8120e4519ceba9ef0ef71b94b2d97058a9231cfba6cf0184dd899155acb44c7b9509b2e1ace227f5557c5fcb3023699bd9b313476728be844a1b3d0b35edb29bf4b11ffc99b8c862c99051ee1dd6cdbf7a3488c71bbc57e64077cb89e74464c392dc6d74a5a044b83a2fb9f31688a584133b061649c191ace60cd1aa8bf64bd7046798ba420d928db288b853683c015b3584d0841ca580", 0xa8}, {&(0x7f0000003580)="c0f55e82808dd728fd47efaef2b7c69832f037b0e95d195ee3717aded0139ebc34dcf5de6a30882c6a1511d1f82148b7dcab151a1c53356b54ec226af9704df42a9728d765972a8e9cf1059edff14b25b02a8684a07b6338407291dda2a1d252b55a4073e51fa9295aaf01f8c09bb8a0d4193d079224e29892ec513911c7bfe96eb84ead6bec2e546c443c40cc40985b34d662c12d0fa2f9369fa093ac0647266b0b31f99889a0f3bc5ccd06a9f836b2c7448e55768a2a3bed28283fdf0b357ddd07a8b295f90efaf46095deaeef278ab04f0e6d60ea2b9e95d755c77fb9859cbad1", 0xe2}, {&(0x7f0000003680)="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", 0x1000}, {&(0x7f0000004680)="fa97c585dd130709d6614faca5c40b00dc7f9ecde54ac21f83368da0cfb0235042d1252209df3b066f280c78b149efede70004753745caccb74d33846ebb29f41169bcbd2e2c89cadcfb0b8bbf53064919", 0x51}, {&(0x7f0000004700)="de4f9e680c6e4611ef2ba580c646d85f22e158040d46c01ada2f69e44eedd939243a5163d71b9a3adf3300c57326f7243de8e4d87217508f04279c30597a5ff4e9ab60bde93b0a30326c813af45df1c89b24c2af935a54882cb12ad33a1a50a3446dfb627d9e590dc2dd1af104e6477b98874e104ecdd5e22cfb2d81681feacc2d44a6e3daf952bbfd2aae60208e1f41716aafdcd6cfeced8699b00d6c262cd577a2a3ac5a6d46138cd1cb28239249be6bd5ee9b2a8d11d1e3dbbb893f1250db095a4629c4", 0xc5}, {&(0x7f0000004800)="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", 0x1000}, {&(0x7f0000005800)="8ccecaae6aeda1cfff53a99204b76e5370535e2ad3296dc9d5c5605797f9b24b39a1edb042e235ba4aafe685b27d8135", 0x30}], 0x9, &(0x7f0000005900)=[@authinfo={0x18, 0x84, 0x6, {0x7}}, @init={0x18, 0x84, 0x0, {0x7, 0x9, 0x3, 0xff800000000}}], 0x30, 0x4}, {&(0x7f0000005940)=@in6={0xa, 0x4e23, 0x511637e7, @local, 0x7}, 0x1c, &(0x7f0000005bc0)=[{&(0x7f0000005980)="b8d7d16ebbcf780301f32b84ae7da16047df97e43d4f098e98862cb1629b445349b1032befcf2c78e5826ddf1647c92498bcea604ebeb54f89acf79a7391a9b3736031e57f6f4c7f6a0fc2126d75e435f71b863f4b74411afd53dc11a28464cb056911ee", 0x64}, {&(0x7f0000005a00)="478eb78d1e444c4b1ac13f6200d60ce14bb03c45966ba8229fe43f14bdff65587c898015e850b9d57517d94ee732433b18132875aa7317e8c00b453d6b0715a4236b91047ad29ac8a597770ed0b5af8c63de10c2d8c1ed73e766e5da0470de316e636e5fa41dcbe18b9f233b042ac457877c9a389d5d4d08f3d32ed1bd8d9dc31fdd9339ad2e5223638cba1eb221b51f825ede0697d4de1b8c58a9c409b39477f6493650083e2588f06d", 0xaa}, {&(0x7f0000005ac0)="7947ca4eb37ff8c0f33f7af68335133cb9e78a91fd45b4bc9ce898da08cfd35f490a66c40d50f2d74fe99374969bb803fa688e0994026d9763064351f56926476738ae45c66d0718f074859da5daa9afd7fcfdb0788022da7d2dc5457e392241f620a158814c8438167976ecfce0596afbc93bd4642335381d6f0ed6ed32d3fd576c5fe75866119dbeaeeda8c8e76a28b9ded8098a7504d30b34a019838b9bb0d2a40c9f1300c7ac4c862b8daa71cb93", 0xb0}, {&(0x7f0000005b80)="0b8f0d21f968b2ce7d467415a7", 0xd}], 0x4, &(0x7f0000005c80)=[@sndinfo={0x20, 0x84, 0x2, {0x9, 0x8000, 0xff, 0x0, r2}}], 0x20, 0x40}, {&(0x7f0000005cc0)=@in6={0xa, 0x4e23, 0x0, @rand_addr="74134956874bcf6c9a3f7324515c0f42", 0x7fffffff}, 0x1c, &(0x7f0000005e40)=[{&(0x7f0000005d00)="a3eaabe995935259c9340bc0559d", 0xe}, {&(0x7f0000005d40)="0f2feba26973290d2b750ab57a1502e9ab7a45ade69a069ffca7f40315384a210c7f1e676f289a589004561d946afc29c6d7e2", 0x33}, {&(0x7f0000005d80)="b038f1f1b59691d5cc7d3dbfe7ffe08b9537a5318575c2810ff681641211239887dbef2c9a7fe09e0fa9e740a729b119c4805bbea9cac62382371e", 0x3b}, {&(0x7f0000005dc0)="a3ebc9f71a787e13a3e3e4c34e26b69cfaf9d55c6787a75770ffa683957af0407dec9a57a11f0bf998a1eccc0d71a19fb015bd47d5a48ca18a52b2bd5b32140c897ef13e6e831edb42b3dd1cc2c19cdb83f794d500bcd1e122f2431106a51c17ef7fd2038d4607a37527932d76", 0x6d}], 0x4}, {&(0x7f0000005e80)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10, &(0x7f0000007240)=[{&(0x7f0000005ec0)="79ab31deefd6aeec1bcff402d2680e5d91e40605ccbd89658851bc47d8a45dd8dea2bc075d9cfacc69f8e4a5937bd31fa191f4e516", 0x35}, {&(0x7f0000005f00)="6672d0a899427ca684d825de765129e12eee2f30b1e4f410875802907978ce8a7188daeb61ce6d0d9c8adec9e1ae1d78e7a5d7cdc67b84135534ab62ea3b10b7baaec7edf322af0e1818eb5e667f8b1be8b236fe3368f3984189bf6dfefeb399ab72557f4105d51db57ddfa6d67110e2d66de7dbd9358570849dcd25786d6bdb8579e17c0ec1fcb0613fe4905889806b71d6574f0b42cdc9ea7cc587ea7a7bb48c820ad9d4c805823c75ceacb777c0238e93d3ca3a938dce02d104f809e4a82eb968007a12c8bf8a5dc81b6ea687ce55311c8164b93dc89b78ec859b7636", 0xde}, {&(0x7f0000006000)="a6e151cc0c9a4629591d1b071719f0d7121df0508526588e45e6e5787f110e15c07f3074ff161292c6e350f4588634069e9e3cb3ec3088b427c3d1c80be57c3bf8233af1068205e8bb67327c1ce142b37fb350f6164882108635580f8e94b77f87a17fc2ca90bd5e76402a8152ab3952133ecb4411b61a0a42dec3407e5fc6cb20a328b3c9fac865bec67e55fede3e2ee2178704b6c7562cac", 0x99}, {&(0x7f00000060c0)="e894a969b15d13755916237f2e850ecda11e859f05d5a025d9882033995efce3c52d6c3569f0cfce1fe5b0aeaecaec3d8675758ae9e991802c390528bf0a499cf7f5acbee534f3d6332b2ebbcfdf769aa995bdec013da407b453113d1a234d82b2114c466f8a0482947f7c7994ae473751b9adc46ea79e23ae2f8d893a60c2371e0699c3db9f63f8f4fa4debbcbbfcc3992ee9016fd9df3d31de98b9eac5391de2cc491a9c366fc68922a933e606b2a776f7004b2ffaf6a3", 0xb8}, {&(0x7f0000006180)="e9efc034ef05816a9470c68cf453ef2625cd8d93", 0x14}, {&(0x7f00000061c0)="feaf632c35fb95e9324e525b575d333111ab22bcd80dc0b73bf230215514695f8eb5fb51550ca8da8220684e40f6248850c609cd785672c464e00b76e1f1d5617c4f417f248ff96d6b572a917049dd59d93367f3c8c2d4e7a1391f", 0x5b}, {&(0x7f0000006240)="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", 0x1000}], 0x7, &(0x7f0000007340)=[@sndinfo={0x20, 0x84, 0x2, {0x1, 0x2, 0x9, 0x4, r3}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0xb}}, @authinfo={0x18, 0x84, 0x6, {0x4}}], 0x58, 0x40}], 0x5, 0x4811) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r4, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 370.518452][T19586] fuse: Unknown parameter 'd' [ 370.540093][T19587] autofs4:pid:19587:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.4718592), cmd(0x0000937e) 01:22:14 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) r2 = getgid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) r3 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x40008, &(0x7f0000001880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000001}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@seclabel='seclabel'}, {@euid_lt={'euid<', r3}}, {@euid_lt={'euid<', r4}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) [ 370.683433][T19591] fuse: Bad value for 'user_id' [ 370.712028][T19587] autofs4:pid:19587:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 370.738156][T19591] fuse: Bad value for 'user_id' 01:22:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0xc803}}], 0x2, 0x0, 0x0) 01:22:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x20000) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000040)) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:14 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="0100000000004c007f") [ 370.820378][T19604] fuse: Unknown parameter 'd' 01:22:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000001780), 0x1000) 01:22:14 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) r2 = getgid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) r3 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x40008, &(0x7f0000001880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000001}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@seclabel='seclabel'}, {@euid_lt={'euid<', r3}}, {@euid_lt={'euid<', r4}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x40000}}], 0x2, 0x0, 0x0) [ 371.062813][T19617] autofs4:pid:19617:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.4980736), cmd(0x0000937e) [ 371.102017][T19617] autofs4:pid:19617:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) sendmsg$inet_sctp(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x231, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x9, 'syz1\x00', @null, 0x80, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="2000000000000000840000000200000000004102000000e1d2000000", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x8000, 0x0) write$P9_RMKNOD(r3, &(0x7f0000000140)={0x14, 0x13, 0x1, {0x10, 0x3, 0x7}}, 0x14) ioctl$VT_DISALLOCATE(r3, 0x5608) [ 371.145116][T19624] fuse: Bad value for 'fd' 01:22:15 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:15 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000060007f") 01:22:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) getgid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x2000000}}], 0x2, 0x0, 0x0) 01:22:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 371.412678][T19643] fuse: Bad value for 'fd' 01:22:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x17a, 0x0, 0xffffffffffffff41, &(0x7f0000000000), 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 371.443561][T19644] autofs4:pid:19644:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.6291456), cmd(0x0000937e) 01:22:15 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',d']) [ 371.512530][T19644] autofs4:pid:19644:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 371.542728][T19649] fuse: Unknown parameter 'obj_role' 01:22:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) getgid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) getuid() mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:15 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000068007f") 01:22:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x7000000}}], 0x2, 0x0, 0x0) 01:22:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @remote}, 0x8}}, 0x3, 0x7f, 0x401, 0x0, 0x20}, &(0x7f0000000240)=0x98) syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x7, 0x80080) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x80000, 0x0) sendmsg$inet_sctp(r1, &(0x7f00000000c0)={0x0, 0xc9, 0x0, 0x0, &(0x7f0000000340)}, 0x3) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x4, @loopback, 0x9}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000040)="fbdcfbf044581c92f7945f86161781788f6e4fc833d0db3db0d3a7a8a75a5295b8a41d6ecc66911826feb85576432fa1f1824e4f153d0f", 0x37}], 0x1, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 01:22:15 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000040002,user_id=\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 371.688211][T19660] fuse: Bad value for 'fd' [ 371.812737][T19668] autofs4:pid:19668:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.6815744), cmd(0x0000937e) [ 371.873035][T19670] fuse: Unknown parameter 'obj_role' [ 371.912120][T19668] autofs4:pid:19668:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x38000000}}], 0x2, 0x0, 0x0) 01:22:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) getgid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:15 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="0100000000006c007f") [ 371.989058][T19677] fuse: Bad value for 'fd' 01:22:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x240040, 0x0) ioctl$TIOCNXCL(r1, 0x540d) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:15 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',d']) [ 372.110228][T19683] fuse: Bad value for 'user_id' [ 372.168016][T19683] fuse: Bad value for 'user_id' 01:22:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x40000000}}], 0x2, 0x0, 0x0) [ 372.196380][T19690] autofs4:pid:19690:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.7077888), cmd(0x0000937e) [ 372.231890][T19690] autofs4:pid:19690:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 372.258857][T19693] fuse: Unknown parameter 'obj_role' 01:22:16 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000100)=0xb) r2 = accept$inet(0xffffffffffffff9c, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f00000001c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=@security={'security\x00', 0xe, 0x4, 0x570, 0x0, 0x1a8, 0x0, 0x1a8, 0x1a8, 0x4a0, 0x4a0, 0x4a0, 0x4a0, 0x4a0, 0x4, &(0x7f0000000200), {[{{@uncond, 0x0, 0x138, 0x1a8, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x8, 0x2, 0x1, [0x3, 0x13, 0x7fff, 0x8, 0x100000000, 0xb5, 0xcc, 0x7, 0x8, 0x1, 0x7, 0x3, 0x7, 0x3, 0x1, 0x71], 0x5}}, @common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x10, 0x0, 0x1}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x5, 0x3, 0x65f0e05f, 0x1, 0x0, "c218f38d4843fab0bf141c1f50a5d30f0c6cc40674ab26d49b27cee0d83a6a4678fce3314045757dc114b3516b516556fc6e660e04d6bcbd46aad0839d704199"}}}, {{@uncond, 0x0, 0x180, 0x1a8, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x20, 0xa1}}, @common=@srh1={0x90, 'srh\x00', 0x1, {0x3b, 0x9, 0x3be, 0x10000, 0x3, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, [0xff, 0xffffffff, 0xff, 0xff], [0x0, 0xffffffff, 0xff000000, 0xff000000], [0xffffffff, 0x0, 0x0, 0xffffffff], 0x81c, 0x2002}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@ipv6={@loopback, @remote, [0x0, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffffff, 0xffffffff, 0xff000000, 0xffffffff], 'gre0\x00', 'veth0_to_team\x00', {}, {0xff}, 0x4, 0x5, 0x3, 0x12}, 0x0, 0x128, 0x150, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0xffffffff, 0xfffffffffffffff8, 0x5, 0x1e, 0x1}}, @common=@frag={0x30, 'frag\x00', 0x0, {0x7fffffff, 0x263, 0x1f, 0x18, 0x1}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x4, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5d0) sendmsg$inet_sctp(r2, &(0x7f00000000c0)={0x0, 0xffffffffffffff0b, 0x0, 0x0, &(0x7f0000000200), 0xfffffffffffffe9d, 0x240008c0}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 372.310997][T19698] fuse: Bad value for 'fd' 01:22:16 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/xfrm_stat\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x300) read$FUSE(r1, &(0x7f0000001440), 0x1000) 01:22:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) getgid() mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:16 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:16 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000074007f") 01:22:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x8dffffff}}], 0x2, 0x0, 0x0) [ 372.602386][T19718] fuse: Bad value for 'fd' [ 372.609652][T19717] autofs4:pid:19717:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.7602176), cmd(0x0000937e) 01:22:16 executing program 5: socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000184000000050000002000000000f7e10e"], 0x18}, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x10002) sendmmsg$inet_sctp(r0, &(0x7f0000000040)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) 01:22:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x22c80, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000000)=@rose={'rose', 0x0}, 0x10) [ 372.648240][T19717] autofs4:pid:19717:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 372.670512][T19715] fuse: Unknown parameter 'obj_role' 01:22:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0xc8030000}}], 0x2, 0x0, 0x0) 01:22:16 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:16 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="0100000000007a007f") 01:22:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:16 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff15, 0x0, 0xfffffffffffffe16, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 372.983702][T19743] autofs4:pid:19743:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.7995392), cmd(0x0000937e) [ 373.010553][T19742] fuse: Unknown parameter 'obj_role' [ 373.017680][T19744] fuse: Invalid rootmode 01:22:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0xf0ffffff}}], 0x2, 0x0, 0x0) [ 373.028628][T19743] autofs4:pid:19743:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000100)={0x10001}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) read$FUSE(r0, &(0x7f0000000440), 0x1000) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000140)={@local, @local, 0x0}, &(0x7f0000000180)=0xc) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000002c0)={r2, 0x1000000, 0x6, 0x5, 0x5, 0x3443361a, 0x4}) 01:22:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000240)={{0x0, @remote, 0x4e22, 0x2, 'sh\x00', 0x37, 0x0, 0x6f}, {@loopback, 0x4e24, 0x6, 0x1, 0x2, 0x8}}, 0x44) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:16 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:17 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="010000000000ff007f") 01:22:17 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="18200000000000000000afad"], 0x18}, 0x0) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c, 0x800) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="2000080000000000840000000200000000004102000082157bafdd69", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) [ 373.326477][T19763] fuse: Unknown parameter 'obj_role' 01:22:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0xffffff8d}}], 0x2, 0x0, 0x0) [ 373.365281][T19766] autofs4:pid:19766:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.16711680), cmd(0x0000937e) [ 373.383646][T19767] fuse: Invalid rootmode 01:22:17 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:17 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:17 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0xdc6) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="20010000000010008400000008000000000041020000000000000000", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) [ 373.486855][T19766] autofs4:pid:19766:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0x1a}, @multicast1}, 0x8) 01:22:17 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000020000007f") [ 373.662952][T19783] fuse: Unknown parameter 'obj_role' [ 373.696635][T19788] fuse: Invalid rootmode 01:22:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0xfffffff0}}], 0x2, 0x0, 0x0) 01:22:17 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:17 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:17 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x2000) setsockopt$inet_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000100)="6c4b25892a08be1c16a4ece7795c051c40b1b491ce17ca081242f66bce", 0x1d) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@dstaddrv6={0x20, 0x84, 0x8, @loopback}], 0x20}, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 373.833763][T19794] autofs4:pid:19794:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.2), cmd(0x0000937e) [ 373.872143][T19794] autofs4:pid:19794:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:17 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0xc0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grouk_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) read$FUSE(r1, &(0x7f0000000440), 0x1000) 01:22:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x4000000000000}}], 0x2, 0x0, 0x0) [ 374.003302][T19805] fuse: Bad value for 'rootmode' 01:22:17 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000030000007f") 01:22:17 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) r1 = open(&(0x7f00000005c0)='./file0\x00', 0x200000, 0x40) bind$isdn_base(r1, &(0x7f0000000000)={0x22, 0x0, 0x9, 0x4, 0x9}, 0x6) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000600)={0x2, 'vxcan1\x00'}, 0x18) 01:22:17 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:17 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) [ 374.130215][T19811] fuse: Unknown parameter 'grouk_id' [ 374.234983][T19811] fuse: Unknown parameter 'grouk_id' 01:22:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x200000000000000}}], 0x2, 0x0, 0x0) 01:22:18 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz1\x00', 'syz1\x00', 0x40, 0x800, 0xffffffffffffffc0, 0x6, 0x80000001, 0x2, "91c8ad9f433eda748d033e42722cdae3574e9f064da85f0a77a87da1e3542b4b79135ff3d4750376421ac1e274510c0b59edde7916fafcc34b8393154b1db40b"}, 0x158) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000001440)={{0x9, 0x7, 0x0, 0xce, 'syz0\x00', 0x1ff}, 0x0, [0x7ff, 0x1, 0x0, 0x9c7d, 0x0, 0x0, 0x101, 0x4, 0x7fffffff, 0x200, 0x3ff, 0x1, 0x0, 0x10000, 0x9, 0x1, 0x5, 0x5, 0x3, 0x6, 0xff, 0x7, 0x70, 0xffffffff7fffffff, 0x3, 0xe9f, 0x101, 0xf1df, 0x6, 0x8, 0x10000, 0x2, 0x8, 0x0, 0x4618, 0x7, 0x17, 0x6, 0xffffffffffff144b, 0x2, 0x2, 0xffffffffffffffff, 0x3, 0x6, 0x6, 0x2, 0x8, 0x101, 0x3, 0x8, 0x1ff, 0x8, 0x1, 0xa6a, 0x6, 0x7a6, 0x7, 0xffffffff, 0xffffffff, 0xd57d, 0x784, 0x1, 0xffffffffffffffe1, 0x1f, 0x64, 0x4, 0xffffffffffffff7f, 0x8001, 0x7, 0x1, 0xabe4, 0x0, 0x0, 0x200, 0x941e, 0x4, 0x7, 0x8001, 0x800, 0x8, 0x0, 0x7fffffff, 0xfffffffffffffff8, 0x6, 0x3, 0x0, 0x0, 0x7, 0x3ff, 0x2, 0x10000, 0x5, 0x3, 0x4, 0x71, 0x2, 0x100, 0x8, 0x6d, 0xffffffffffffffc0, 0x5469, 0x165, 0x3f, 0x7, 0xec, 0x81, 0x9, 0x1, 0x53f7, 0x5, 0x5, 0x1, 0xbb, 0x4000, 0x100, 0x8e7b, 0x32, 0x7, 0x1000, 0x0, 0x7, 0x8, 0x2, 0x3, 0x0, 0xfffffffffffffffc, 0x0, 0x6], {0x77359400}}) read$FUSE(r1, &(0x7f0000000440), 0x1000) 01:22:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:18 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000040000007f") [ 374.370169][T19829] fuse: Bad value for 'rootmode' 01:22:18 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:18 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) [ 374.545305][T19841] fuse: Unknown parameter '0x0000000000000005' [ 374.555190][T19845] autofs4:pid:19845:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.4), cmd(0x0000937e) 01:22:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x14000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000001c0)={{0x5, 0x6}, 'port0\x00', 0x4, 0x30000, 0x6, 0x8, 0x5, 0x3, 0x7fffffff, 0x0, 0x2, 0x8001}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 374.589046][T19841] fuse: Unknown parameter '0x0000000000000005' [ 374.599729][T19845] autofs4:pid:19845:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x700000000000000}}], 0x2, 0x0, 0x0) [ 374.665766][T19849] fuse: Bad value for 'rootmode' 01:22:18 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000050000007f") 01:22:18 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000001680)='/dev/vcs\x00', 0x200, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x200c0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x10041, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000380)='/dev/bus/usb/00#/00#\x00', 0x4, 0x40) ioctl$sock_ax25_SIOCDELRT(r2, 0x890c, &(0x7f00000003c0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast]}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000200)=r1) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r3, 0x80605414, &(0x7f0000000100)=""/64) sendmsg$unix(r0, &(0x7f0000001600)={&(0x7f0000001440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000015c0)=[{&(0x7f00000014c0)="6e61c44c99dfce573cfcbec8a5d90de413b0c89f3b646a1c5c2f93c031b4384b149f645a84ed21f7be36aa623c0ad452e692c9f98c08c6b622ac5910a7319764aadf757f920436f62322b5fd2094d210ad40ce4364a26b5f588d39bfd653d301c4725f393d750b12a5b03678dfa836712a271ae1b874d9101f4b1602fee6cd7d4965af4f0c968aa5f79e5b354e53ebc2732bde2f88c599214f2d6003c1fd9664cae43144d8b58578f5a99939895631813b42128d5915a0babd63216cf72658d3bdd16f68e9c6da8b79", 0xc9}], 0x1, 0x0, 0x0, 0x80}, 0x20008040) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001640)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000000)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x780, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7fffffff, 0x7, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="29726f6f746d6f64653d303030303e3030303030303030acd130303034303030322c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f6914d22c88643d", @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00d1bdd121fdb2dba79839642dd7b038000063c81c866b0efd3d7a0edfba14caa76447547ebd1b393085a13b659fb5020dde2c0bd786aaa270261c264cc8e91bede0344effcebb26793dead67cc969f3f875a8234a167c888bcf4d677f7deb4e453cdf2795e8f9a5a0b49e07d2cfb1486d6c3de13a78a5697cc604e6430745b2"]) syz_open_dev$sndpcmp(&(0x7f00000016c0)='/dev/snd/pcmC#D#p\x00', 0x6, 0x400) read$FUSE(r3, &(0x7f0000000440), 0x1000) 01:22:18 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,use', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000fd000000840000000500000000000037b5151087ebd4591ae54a60000a08d34c51ae9fc57b270cc2cef0e67be163eb754e2501fd5c46a25e630dccb0833b04ea00cae1f52a79fbead9b73dbb68cd06b545f54275e6905b3b5f1ed482b02535860ca2b2ba4265f49e422d405b133d95f72c836ec27d98f4fefde1ca40439455fa4f26887c7b92a4d1fed6dd1746f49cc224833157c10b2f195f4e5eb4fdc1cfc32733dfe79bf3902075351b7b193fcaec9c5876a5adddcb2a95a05708563432a55c40d12d4b74"], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101401, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e21, @remote}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0xcc, 0x3, 0x2, 0x80000000000, 0xcadd, 0x9, 0x3f, 0x7, r3}, &(0x7f0000000400)=0x20) ioctl(r2, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(r4, &(0x7f0000000000)="1c0000001a009b8a14e5f407000904001e0000000002000100000000", 0x1c) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f00000001c0)={0x7, 0x2, @raw_data=[0x7ff, 0x7fffffff, 0x930, 0x9, 0xa1a0, 0x1, 0x40, 0x3, 0x0, 0x9, 0x0, 0x4, 0x3f, 0x99d2, 0xfff, 0x9]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 01:22:18 executing program 4: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) [ 374.873549][T19863] autofs4:pid:19863:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.5), cmd(0x0000937e) [ 374.943245][T19863] autofs4:pid:19863:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x3800000000000000}}], 0x2, 0x0, 0x0) [ 374.987190][T19867] fuse: Bad value for 'fd' [ 375.034523][T19876] fuse: Bad value for 'fd' [ 375.038250][T19871] fuse: Unknown parameter 'use00000000000000000000' 01:22:18 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000060000007f") 01:22:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="200000000000f4ff8300000002000000000041020000000000f4ce13f6e44ceae90000000000", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) 01:22:18 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRES64, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c3d0000000000ec0000", @ANYRESDEC=0x0, @ANYBLOB="2c646566f473bb0e9fc57304f761756c745f7065726d697373696f6e732c00"]) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0/file0\x00', 0x6, 0x6, &(0x7f0000001540)=[{&(0x7f0000000200)="66642762461ca217e92b5ad9e906c4", 0xf, 0xfffffffffffff2f2}, {&(0x7f0000000240)="073c7b3bd1a3fa13cfa348823faeef0e1be4c11d5e1da17a172c75c4a4c1b6382706a3759c9d369a967ab245f267b26e4e03b64f5a18c44288c5bb93dfbaf102f20acbe5136c9ad709eb35b60a969413dab6e4332356019d7227b76a171a1d33c3704256d9a6b2c30e991f03a74225cdaabf8468f793b53e151e52648cb23a776f73324e77ee312770088939c6d7a502a220558db42a1e6122bbe2168d7cddf1614f986d2ccd860f6467d0b4e21957b2e0601dbc61696f0696cfc4ed444e7a9852fbac5ce3198c59f76f7351ddc6f051983a668409d95d57ce288d4927a3fbd172339d08422391b80790fc55e5", 0xed, 0x12d8}, {&(0x7f0000000340)="beac4f6813604d948e96e3bd58abef88ed9d3e954fccd569fdae6e13a07b82709261a77e7862d0a50b3b79942e0b5d6fbd7bcfe123fd4eeff7fe597777601095d3d3f0bd579717e9e72dabedc1843fdf24403995a3ff060704f0f198635dd24a271581c05b0234f0492809d0f59782dfcdfbec508b67487d36846dd9baa48ae408e74ea57c9cebbe073315b6ea33d5c7cc6e34f21e4a155be3679a8a2234c0a09059ce64c43f03d181dd11314e5c694b48e8b7b370a1094a0194f0229b4945a98364a66d7eb9aceddfab74bdff1a7220174a15bb84f1a91c9e172edc7d9675420c1bff398b43a171d7709f3f54fd4c18654dee004e1f1dc793bb3b33971ace86168f038b0e713a3e8d684936ecc98583a48859064f980b1e8f14d857f9ab40e8cac4fc042e28ec349db5efd90f33fd121e0e310e7d8c0d5f69059988751e74b308a844b9a10113f762e75a4e86dec438f71aef92d541c372c2d033704a7f784f15f3d9e2bdb3ed0d447f2cc23c5d70a1ed7098c16e4b104fd40b4667ed9711990b42bf9112429f6f84d9fa0a76f03f205fba2c410c2e0b39c2be836fceae765d8c870114ad104c0866af4daef6bc0cc98cc610d8fa5953dd876610358850fadc730052cfce8dd5cdba44eacac84e0d5342a3684dafa48657ac64146c50b459873f69aea26dbe681990d066a5cbafbee54b9654c511314643912cfd5369735f6fd447647b7d2c117e172b2868001e2933ede743e6a466231a9faa24ab9f5cd01c5369769e55ca315d193b70bc70850537583e15daca1e7a856f0439f8b36c8acb3bac5859b2795d7f92060ddcac06d77c4305fe29009073ead2890f035835a983e4478203f223d55209a58e8b1b390765ed548929ae931debbcb393cc3dbfcd030394ef11243ff01b8a4d9f74734b07cf15da23e38e6032976edd50726b878613f44f7884d82418f2666dab44f40d8e9a9ec61da513b31850f85747b00bc90634df0d866bda2e499d06903606cc0a2fc8d75f51de36170b0b51281da46e5333153a9149e4ea9a638e8ac11afe9f267b25f6745ccdec831a4b802b5b88da8b504f3f19fa19051502c720a35d4cb0d3bfa8578bfbd51d87771312074ec4b245c7ad979454c29f515303c5146723c5127de8666924fa8ffee7cf754818ee52e5c712525778a11e6c8f51f50e448ef60084ef1929aca779cf40f13bce39a5f67b8ced0b47900d9b3acf00531cbffccddeb84e0c3e4ed29cfd426566e1fd87375c22d229ea58b7519bc8bba0ab8da2003ad1eb1135a36c9d319f592124d61493e7fe10775994c4e4a258947ec92cd75030bf7e2de3e14dc69c97dac29addf6c46c5da48e77a9db5900c15dd02519840d7c6af4a477cff5b6eb7e1da94cf8239edda43b0a97f06320d6868fe54c329495ae7392cf67d25613f5d4254c0e31e8ad168308adf88909dd388b81faced95245e655dc154ff2f47259f3892d31d9e59cabaf32a8aa5bca63f3543157fcd11713bf990a51ffe1046626a80067da80b8d71e9abc52150b92b9f71877a0dbede39d11cb12a8a61d89d264b0217df262ae01556f59377ea52ad38a4e571d643639c320ae7ad54e2d3473bf546fab78c75f589efa0bb782dca39dcd5a5ba0d79d6d0c3d947b103ec423d5cb2037bfd9a4400e8a060c976a8f55e6fab0325f2e00831b6a63421576839455578d2b1e8dcc850cfab3a4c5b0e7d4709ceea0805026f930cbd14af817a0586e76eb7d1063f25643db7f6e889388f335a706096b48c16c6fa5acb9162d7a7fc4526df56d36be9e1c1cc168e247ecab7b2be73b93f85225f53bb122cfca9d9cbdf68884d8427ee41b4b1b35e99bbbcd23bbf7f91a6437a5efcb738791fa8891e16efea65a75a1406a46d4d49c9ae4cb9fcab433c181d81fde53439031aee2f816d44399a2fb64c76fee600a2ca2c0239fd42bd1c4da3f1281c0fec6e53353c3b14b9d605f6b29e97f8bcd450e2a10cc86c7c21a83139b8c71d5866174dc7c6ba2849dcfa4b9c6f053d44fe7d288dfe28f641d154604679a40937a1f364411082526ecec0099d4f7fea8586f8aa5831fce2558e047de899a63c448bfe2138383d2b20154827dd85e56529dfa3551cef2f436318c299e05f29114c791a32c002524d400272d425d54546db62413aaf25f221de7ebbe9a0d0fcedc9aee4bc495b2471206aad570ee169252e03f9978a5f69d7e5359a9f1c68c608540bfacb89171b8a1d8a0461387d58394067d1e825da96768fee4f28d0a37eeded9a33c6ff1f7c173ef0141f2698536625cf188bab8c030a1553d677c4da9aec5ca76591e97327c925e59029dc0dbbe31f2a67040fdb6b6067cf45d30823ca818951e45f02e77f22ec72af403cb73ab0c92d977806e3663bafb3dab919c64021ee7f88ef011b24640859a08a8b369f0b0ecb19ddb6fe592737e095037d29717ac232dbdb7daf7de239403580e3ee1385ed0ff42bfb720512c0ea22c20ebe49beacdad38f975a4be146df166cedf147c98215efb3282e620d50660562ec578bfb8b0cb9b973e48b7af4906788a1f19098180609f3398054f36b386fbfb6a1ee2639dd9573ad1136c89fb64bc9b480967e0f4c85335acc719bfab44e80780f77b304d1dab990122fbd55d6c1ab12b2654af46bceb281a6c22a8ae82f994185fc1e7842bbb265775b7b9252d80e56169f5c9fab41214ecbbed738c78bd3943b0a731b884a0f9d1de25b5acd76aff70ed837ded32b929bbce41a76189abcd23a9c7ef9cc3885a78850aa6549e390f590c526328139b4e13b18672114a7547bb3429ee77d1e4f19f20302fd4dd7479205222e4f23258ce8460bea13d1716f49bafb7bfc045dcbf2b59a4eefcb25bf2113eb8ebd1a03618dc0508db2ab3f5ce6920a7f6b858a30d3aa70d0cc107f92a25c42017273a711eb60c6d0f9090e4022482de5141637422b66ab8508b3504d359c071805ed32a262cc54a9e152502c28dda1e2e7297f4545bd09c1ae6d887465bd465315460c79ef9233fe3c01b0628c1fa02ee9e928080db627e285384f3e8abaab2a1271ea4611cf4f30a13cf1f4672c1ef3589a76ca386a55dc614d28c450fc644aeafd707fea2394724999f6574375ecb5d2029a1ab207c4131a8a27c1552590c23e0257e411ba9265fe4bb1b86b807d11cd9823232809043e5cc13e8352379661c95e711e2a85526ad24310ef7b6c96bb80337228645778f86cb321be16846bc4a9837c54bf58e14a02ba844f856145c9fe45f9148ca23458e75325ba83759d094a8563413f2cd1b8c15123eccc23c704445e5f14c1695300112e99f23e45de1ae5184232b430797c7f3b756efb7f5aa3f2e97cda0caebdab78f7cf3e2d60a72408d6eca773a7ba6a27a3d074cbf1a8d15fdeff805e6b0d388ea39a62641ca7c834f3dc519862a9832af4e7f5e068d0e507a7e587575897eef6fcf6a6850d9a2e3fedcdc196aa064080afdd90c3c8af691cb5a7009209e0ea491b451919b8b0d12190c52bc174325f0b4a23694741441914e9c4bd5b6d2634c8c64a17cefaed0cbd0eb971fee6d04d05e894d2ce5caab1fa136e0e3c1cd0ad3848f317ee5394658eabd60de54861ef00f77ff3e8b2f36580e21923ed0ff35683e65b79d04a97785b37fada5f9519556d9eb7a17dd614847658d47d33322fdef6a8a8c5f1fe52162769db376add5376d1929dd3bd29b1ca1f32d434e85e7f5947a4eaa672e70e17be064afa9a5d3c6056b854a5d027e012b98317b051e488868aa74682c11e032b44f6e0eae1253c06319cf3bcba8201cbde7c3607b843e7b2368b322d91e780d6c23a5a4853bbf2894157292f8426f07157bf33038ea07ba4be1924335e0a1bc4bf292f86a2d6081cfc097dc128b9d7aaba49a8c2d1e966c7975a88ae23f27b668aff2fd68caaadc761bacab133edee35a723d8f1ec44b3418a2eacf5cf229785af6a835831d08f2a472ea0368dcb09767828c68815a96b8c7938b8c52989852167e8c62ade7f65f19245aec70a4d5c55108e6b22d353c36626ac2209d90447ede2f776fef285ad02221788242298a9d249a9824f8ed3c5b02a0340b45828ee5b5d9b97939dc9987213cbe46017c8a10c5db71ac7acceb613c38c72e81b7d212a981cc446ed33ad49e7ae9412b688124789a41bb24444254d34cb9f21f288ace6e420aeea3831b066edbbea3dacfc9b73b03f0466f701677b71009546903b5af9583456a6bb490a93488e8df03506eb7ba3bea97df1a00e96c0866bd1edd0721c9e969b31358b7c81bc8f506906f4d7731e6076872f2489a4c468614fcede0c2e1364f56fabe28533f157bf60be7e9bb44b567b155212cad8358c37b9ef3eac2b073d44880c480876c69ca1f0166d929a1b2ca62187f4b43ec7ec5d6dc1e75a1963da005a09b3a0c94ebb7ee06673b631f15105b31bd332e54b153f6677c6fe288e2fb76797f0c2d6a7aa0739675b8e7f3d66bf749381202c687f45b4baaf410c3448816a5cb62423a27b2de0be2ff1a7837c89f7891d02a3e290648601089e49a164db868f97bb06efc2af4c5bb452bc29c8658738a79b080bd8526d14ab04597a0b399eb42371be23c5a6656e704e047c6ff4b89b33cf954a9f114f0e3822306294a99aa32da64023b4431663ef9c5088c49e53752d4db30cfeace24097db99ad68b8da3321addb0bed87f576bf5f53dd467874101787334d159b1d7ada435add6aed2deb6a3fc6d1b34d5063c6d95674a0002671630f9fc14f4ac5f281d41d893b0332cc35cc15e982ad914bb01cf13d3ccbec9ebcf52af7ebb14e12fe0965ac84a937939afd7a03fb5bbd31813d765144a7cd11037d4c0f606f30c2fc8cf66803818df3f972c262073640021704519a9f6b64ce202c4acfc48506f5060de49f0a6b8c8d361f24cb7ab4971eaaeae7f323a46a5a5557d51a307707654a1fa057c15bf350d129bec3e0486a25c5b7520084c2d66d6a47353aa6adc1d29faae62130a6d1ec387db733dea1c7c7207fabd48e46fddec87aeb1bb2d645af00d6807127aed68535843b6ef73c49eeec0b9bd8a1cfbfdb9aad2edb91241820d1a8a79823fd23bd1abadfc1db05c0145645e70976e8decdf9f0f04d4d952b20d5d367ed0fd135b1edf4cc1f21a851baca04e28e0fc2325755ea807e5ad26c6f47de306632ac77df13f0e682b75c7fbcaea244bc279a0b4a6e7322f64ba53afbddbc34b395dca415298a43d8a160859e558698130e251982b8284aaecf64f8276c20683b9ae975186ef96b064eb4eb7abb380f35a4bd775fb01b6a39fad13c5e1cd36907aa9b4c6b2d2c0f7f1169ee52f3b95d070745ef84710d822e09a4f30966c1eb9a81ff2f9c918df9b068876be1d4472e52ab383feeeedc6047a854b2c0657a2110b004c69589cf5aadbaff21f9f1ccf058d6bee77e103d8003b15440f4e3357597124083d34d58c0f4820692987ee615078cec88578caff56ed31a03f83686b87bb3018bfc743a24a49063f91acd266c3c8b6356530f9101bacc13f8e99663a24b46d9f5540520e66df640591bbeabab86eeb6bc8f66473dfc1dc4c749fff98fbf994585657a2544e643ac0901c53420e4c3cc5e1724b95b831367531762730fd32630f14f4ece11cd5c50a0a8446d6da5077778220d89e156b78cc7d98410e483eedc51125d2a1f5585a812bd8b9324bdbf77ac5fe8692b6fee422cdaefea2160988539e907337f995459b70a0dc86c8b05f6bd4fb8dc5dbe356f8c61ffb8d628ce3", 0x1000, 0x2}, {&(0x7f0000001340)="c4f735dab5d6d44c51a6f1bed6ed98b24c2646c19a214b1a4da0fc8a7df01704c1b8a16ac35360a59f8adfe1a828377a243d92233550755be6ec8b0d543e3c4109ae12477e25b36b2a0e054775f45d77ad60309e15da783eb51e88be73afff8e715f2d4e5224c541af6b59001340c77921e712ac46633df740263d73a360908f1ddd92d9fd703069878137f666a72827b7eccded53d2130c6097e3c0be0d87d3b65221d1c44f11f9558984739df4c6ca", 0xb0, 0x3ff}, {&(0x7f0000001400)="f569c12e40ca8b32749668bd8dd1c1dea26bf9580106af", 0x17, 0xf598}, {&(0x7f0000001440)="5da2c41ccc073e08251880d2f85a217e21141e23f0e4c71133a7603f7748b0f1c4923e29c7310da37aa0efe8ae645976571684d82bc389d9031145517d001858c47ecddfaf50325582576a92bf7945e80c639fd0b154f24f0e897dfc7f979954f8c0432ebff0e35ad6951a7b29dfe5da79d458b9c28c36b569e98f30b3b89366a23c20d00d6acd004d6d1a67e42d2d008c9673eb15d380ad60a6ac95e94aeca02e8d2288e8e24a6e010d97dc0bc0c69f0873fa4ec22f5d61fa45852c618246487a98b1f02e664899a053179a", 0xcc, 0x1ff}], 0x8, &(0x7f0000001600)={[{@fat=@sys_immutable='sys_immutable'}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, 'proc'}}, {@smackfsdef={'smackfsdef', 0x3d, 'fuse.'}}, {@context={'context', 0x3d, 'root'}}, {@smackfsroot={'smackfsroot', 0x3d, 'selfppp1'}}]}) read$FUSE(r0, &(0x7f0000002780), 0x1000) 01:22:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x4000000000000000}}], 0x2, 0x0, 0x0) 01:22:19 executing program 4: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) [ 375.290969][T19890] autofs4:pid:19890:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.6), cmd(0x0000937e) [ 375.354374][T19895] fuse: Bad value for 'fd' [ 375.362220][T19890] autofs4:pid:19890:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 375.371071][T19893] fuse: Bad value for 'rootmode' 01:22:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getpeername(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000100)=0x80) sendmsg$inet_sctp(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000084000000050000002000000000000000479c038a19806e84c3b5f4ebdc7ee36c2f5ebf72fe038dedb69cd06187b05d239e938bccb43e611d2b34b9b9a46d4fc952d2a671482712a10e9e06fa725924b90f846739bda71116c997bb4227c2ce2379ffdee72340acc9bb5b3fd107000200000000001eb00fae532ba80748b808be79bcae2c013e2accf3a0f200dac1bebad931af2c33cc68f7ecf9e0321293bb8c582e8632f211f4f617e52ee7f37ee7f89c6ebaeae7a7a0edfe7435702f"], 0xc5}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 375.436238][T19899] FAT-fs (loop0): Unrecognized mount option "defcontext=user_u" or missing value 01:22:19 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:19 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000070000007f") [ 375.517745][T19899] fuse: Bad value for 'fd' 01:22:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x8dffffff00000000}}], 0x2, 0x0, 0x0) 01:22:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff, 0x3, &(0x7f0000001440)=[{&(0x7f00000002c0)="e9fbef4c580981b0b7efcad1c963a8aaa193afa6e588e82dd574757e49f90cdd33adee6292355d2148f8c616df5634ccc3d21de053246d731b1318d55b435c34164cc4922c94522e5bea6c95e1bd9c2684b8b7025664f8a65ea43545bbb351087db9c2116a40bedb825aaa523c90d5d21c34b08f9a6fb935b48529b77d7cad78acce74eb70b40652357429ce4857c49cad25756da35183f2c2f74cd4f346af3c577142a5df20f8f0566f878dbe6ff6289d8f97e6af7acc554fe8ca843b8dd0682ba740933eacd02bb3eaf3abdd18497df513e2398e4d7f18fc4bad538f2ec69d20846981110731210ee7512b61b476cd1d2d3e2a", 0xf4, 0x752f}, {&(0x7f0000000100)="2eaca563097a7e670f08bf8ce2b35fcafbf076fa76b4a54286c7ac588cff0a2d33dc152a1863725aaa0c78e06fd74affbc893decf5ff97a106c781c423b8a37301d302da43f8d4f765ce3c923ae97a674c19dd5ef73a8cd3ca760cdc302720e66358925c31a3464ca70ab81b8d5c408c7dcc0793c522af913cdc", 0x7a, 0x100000001}, {&(0x7f00000003c0)="8933e6050179affa6d361a1d4d5fcc9e1d8275eeb086eacec8218f8b85848d90804c03becdacd2a7d2c5a84c0071c98d26ac8f6f50aca8ead52acade3f04936b8fe554c9e2b1827de9561aae79e5", 0x4e, 0x6}], 0x4, &(0x7f0000000180)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001500)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="32676c93023329af3f3d", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:22:19 executing program 4: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8281, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x80000000}, &(0x7f0000000140)=0x8) r2 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x20, 0x800) sendmsg$inet_sctp(r2, &(0x7f00000000c0)={0x0, 0x2e4f49fa5344c1db, 0x0, 0x0, &(0x7f00000001c0)=[@sndinfo={0x0, 0x84, 0x2, {0x5, 0x200, 0xa250, 0xd2d, r1}}, @sndinfo={0x0, 0x84, 0x2, {0x800, 0x8000, 0x3ff, 0x5247, r1}}, @dstaddrv4={0x0, 0x84, 0x7, @multicast2}], 0xfffffffffffffdfb}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 375.702115][T19915] autofs4:pid:19915:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.7), cmd(0x0000937e) [ 375.731740][T19914] fuse: Bad value for 'rootmode' [ 375.817542][T19924] Missing colon 01:22:19 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',d']) [ 375.838919][T19930] fuse: Bad value for 'user_id' 01:22:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) gettid() getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="20000000000300008400000002000000000041020000000000000000", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) 01:22:19 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) [ 375.866296][T19915] autofs4:pid:19915:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0xc803000000000000}}], 0x2, 0x0, 0x0) [ 375.949672][T19933] fuse: Bad value for 'user_id' 01:22:19 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000080000007f") [ 376.046430][T19940] fuse: Bad value for 'rootmode' 01:22:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000002c0)={0x1, 0x2, 0x1, {0xf, @raw_data="91ff25f87707301943e0c241f190eb156482e6a9b3896463b733f6ca7dbee4b8d46167f6a79726c20e0cd40b8429c0191bf9c0c44172edbc7db13f2cc6637f3ea9e84a744f2cdd161399c6420cb7099a0e862d6d3d51fe3e1a6e5048082ab700bb3d8ab941dda593d0ca88f6073841ba8b74221c80376486681dbf2abb6926fb7fd1d934a2b091c505d73357402fdd5853781c8dc7cfc979775163ac91314a16c71c0c715763aadf2bb20a3c4593d7b1fc642b5107ec8e79fa557d2b8b9e90ec4d4bd306533c11ba"}}) 01:22:19 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,u', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x3) 01:22:20 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0xf0ffffff00000000}}], 0x2, 0x0, 0x0) [ 376.235020][T19953] autofs4:pid:19953:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.8), cmd(0x0000937e) [ 376.345147][T19953] autofs4:pid:19953:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 376.364081][T19960] fuse: Unknown parameter 'u00000000000000000000' 01:22:20 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) lookup_dcookie(0x81, &(0x7f00000002c0)=""/200, 0xc8) read$FUSE(r0, &(0x7f0000000440), 0x1000) 01:22:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="20000000000000008400000002000000000041020000000000000000d829679aa4cdcc8dbda4bb22eed8c20c17adfa84992ab406a9ea8f0427ec9758c133d4a9c1b4ac08f0a9d46582da297f17505287bc03509b2efb95c8eb8e8856c2314919b4de54194478bbe2fa20f234c1876162ff1477a1022319fb776e3983a1113f8c94c7bd1eeac786564531d2bdf1fd2e2883622bf0158d925945380346982082dc9fa57848", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) 01:22:20 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:20 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000480000007f") 01:22:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}], 0x2, 0x0, 0x0) 01:22:20 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffff3, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 376.744036][T19987] fuse: Bad value for 'rootmode' [ 376.746337][T19989] autofs4:pid:19989:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.72), cmd(0x0000937e) 01:22:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000100)={@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x2, 0x3, {0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0x16}, 0xc747}}}, {&(0x7f0000000000)=""/52, 0x34}, &(0x7f0000000040), 0x3}, 0xa0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 376.844220][T19989] autofs4:pid:19989:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:20 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="010000004c0000007f") [ 376.928749][T19997] fuse: Bad value for 'fd' 01:22:20 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}], 0x2, 0x0, 0x0) 01:22:20 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:20 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x58, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x1446, @local, 0x80000000}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e24, 0x8, @empty, 0x2}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000280)=@sack_info={r1, 0x0, 0x5}, &(0x7f00000002c0)=0xc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x2a0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYRESOCT], 0x17}, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000000)={0x3c, 0x8, 0x4}) lsetxattr$security_selinux(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='security.selinux\x00', &(0x7f0000000500)='system_u:object_r:adjtime_t:s0\x00', 0x1f, 0x1) ioctl$KIOCSOUND(r3, 0x4b2f, 0x5) sendmmsg$inet_sctp(r2, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=ANY=[@ANYBLOB="280000000000400084000000029213c90e0041020300000000000000", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) statx(r0, &(0x7f0000000340)='./file0\x00', 0xc00, 0x48d, &(0x7f0000000380)) [ 377.142218][T20010] autofs4:pid:20010:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.76), cmd(0x0000937e) 01:22:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000084000000050000e52000000000000000"], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000300)={0x2, 0xffffffffffffffff}) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, r2, 0x0, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe9ed}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) read$FUSE(r0, &(0x7f0000000440), 0x1000) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x3, r0}) [ 377.212459][T20010] autofs4:pid:20010:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 377.234547][T20020] fuse: Bad value for 'fd' [ 377.240513][T20021] fuse: Bad value for 'rootmode' 01:22:21 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x2, 0x0, 0x0) 01:22:21 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000600000007f") 01:22:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:21 executing program 5: r0 = fsopen(&(0x7f00000001c0)='ncpfs\x00', 0x1) r1 = timerfd_create(0xe, 0x80000) splice(r0, &(0x7f0000000200), r1, &(0x7f0000000240), 0x4f2dc31a, 0xd) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r2, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 377.538355][T20044] autofs4:pid:20044:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.96), cmd(0x0000937e) 01:22:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 377.579924][T20036] fuse: Bad value for 'rootmode' [ 377.589483][T20039] fuse: Bad value for 'fd' 01:22:21 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x38}}], 0x2, 0x0, 0x0) [ 377.681378][T20044] autofs4:pid:20044:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:21 executing program 5: r0 = semget(0x2, 0x3, 0x400) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000000)=0x3ff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:21 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000680000007f") [ 377.868802][T20066] fuse: Unknown parameter '00000000000000000000' 01:22:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000280)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/keycreate\x00') write$P9_RMKNOD(r2, &(0x7f0000000040)={0x14, 0x13, 0x1, {0x3, 0x4, 0x4}}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000300)={0x0, &(0x7f00000002c0), 0x0, r1, 0x1}) futex(&(0x7f0000000140)=0x1, 0x3, 0x0, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200)=0x1, 0x1) 01:22:21 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="44be98681dde942568cc", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) write$FUSE_LSEEK(r1, &(0x7f0000000000)={0x18, 0x0, 0x2, {0xf6}}, 0x18) read$FUSE(r0, &(0x7f0000000440), 0x1000) sendmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000000280)="3333496f6ee4c0581091f7b0d9e3538438fc912b960be8c742765e83bc92fee0dc852738b3bdab37acce3890ebbd950f2bc8e139b8aed5fac20deaac8b60c6516d6096ef12a6e7fbe887d7dc7dcefe49b7ee3b1e36387c2784aa1e40d4b2310c736bc2892614744bd4f6f21b5b954f8612d6da32c29220c0ef1bd11bb2ecc4", 0x7f}], 0x1, 0x0, 0x0, 0x4044001}, 0x8000) 01:22:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x3c8}}], 0x2, 0x0, 0x0) 01:22:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) [ 378.050886][T20077] autofs4:pid:20077:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.104), cmd(0x0000937e) [ 378.224268][T20088] fuse: Unknown parameter 'D¾˜hÞ”%hÌ0x0000000000000004' [ 378.241199][T20089] fuse: Bad value for 'rootmode' [ 378.243984][T20077] autofs4:pid:20077:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getgid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000840000000500000020000000000000002849624eb8c7db87bfcd5b358df2bdaabcaced63afc8f3f4e6d36c2614b7dc6365aa2b1803a5ac4cb5f0d4dd14d0f7040a40b58b"], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:22 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002', @ANYRESDEC=0x0, @ANYBLOB=',d']) [ 378.277786][T20088] fuse: Unknown parameter 'D¾˜hÞ”%hÌ0x0000000000000004' 01:22:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) 01:22:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x700}}], 0x2, 0x0, 0x0) 01:22:22 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x101000, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f00000002c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r1, &(0x7f0000000440), 0x1000) 01:22:22 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="010000006c0000007f") [ 378.573034][T20105] fuse: Bad value for 'rootmode' 01:22:22 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x800) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'veth0\x00', {0x2, 0x4e24, @broadcast}}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:22:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0x2, 0x0, 0x0) 01:22:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@empty}}, &(0x7f0000000040)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000003c0)={@initdev, @rand_addr, 0x0}, &(0x7f0000000400)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001b40)={0x0, @initdev, @remote}, &(0x7f0000001b80)=0xc) getsockname$packet(r0, &(0x7f0000001c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001c40)=0x14) sendmsg$nl_route(r0, &(0x7f0000001d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001d00)={&(0x7f0000001c80)=@ipv6_getroute={0x54, 0x1a, 0x12, 0x70bd2c, 0x25dfdbfc, {0xa, 0x14, 0xb4, 0x1f, 0xfd, 0x0, 0xfd, 0x6, 0x400}, [@RTA_MULTIPATH={0xc, 0x9, {0x7, 0x8, 0x80000000, r2}}, @RTA_EXPIRES={0x8, 0x17, 0xffff}, @RTA_MULTIPATH={0xc, 0x9, {0x3, 0x40, 0x4, r3}}, @RTA_MULTIPATH={0xc, 0x9, {0x7, 0x2, 0xe82, r4}}, @RTA_MULTIPATH={0xc, 0x9, {0xc5, 0x1, 0x80000001, r5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x20) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 378.618213][T20117] autofs4:pid:20117:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.108), cmd(0x0000937e) 01:22:22 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002', @ANYRESDEC=0x0, @ANYBLOB=',d']) 01:22:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) [ 378.680996][T20117] autofs4:pid:20117:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:22 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000740000007f") 01:22:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f0000000000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) [ 378.908543][T20133] fuse: Bad value for 'rootmode' 01:22:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}], 0x2, 0x0, 0x0) 01:22:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) [ 379.007366][T20140] autofs4:pid:20140:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.116), cmd(0x0000937e) 01:22:22 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x28040, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r1, &(0x7f0000000440), 0x1000) 01:22:22 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040002,', @ANYRESDEC=0x0, @ANYBLOB=',d']) [ 379.086998][T20140] autofs4:pid:20140:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:22:22 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="010000007a0000007f") 01:22:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xc803}}], 0x2, 0x0, 0x0) 01:22:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x80001, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000740)={0x10000000}) keyctl$invalidate(0x15, r1) r3 = fcntl$dupfd(r0, 0x0, r0) sendmmsg$inet_sctp(r3, &(0x7f0000000080)=[{&(0x7f0000000140)=@in6={0xa, 0x4e20, 0x1ff, @ipv4={[], [], @loopback}, 0x58}, 0x1c, &(0x7f00000006c0)=[{&(0x7f0000000200)="408d3f3cf4a0588851d45eadec3ac4d95d5964f97d0933122a82b1fd887a0eca8679a844f231cba52bab17fbdec7571d1ce4fe964496188aab6cb2eaac9c68acae681a4d7b2b9c0d3e80197a6abb268112fd2f51e47486e90d335174c8f30e78afea0f440075601bc6fe47651a756fe833671b4fd2f21ae9badaab81efe4fc8c08ecfdffb89a89", 0x87}, {&(0x7f00000002c0)="5f9d9d3844d77f3f58b932a092d8a98ff1832a2c6ec0cd7d7833f9d082c2c07ffdbba62842b60821e86a9a8465496787d6efe31932f0fbef84d12ce4ef07ca97cfd0b6097de6c5e2f6ee7396a3c45cf3c1f0b0770ec80582edaca448e17152695d549a29e9bef0b133f6502cf9f9ecca0f7197cad1d964066be754a8cede133a51fd447f62dc1e33ad4ea5c917463993e600f7fed62e29cbe7eaf37278c530ce22b3f079f5976b99070e9073b1f16955653d280c00", 0xb5}, {&(0x7f0000000380)="f307e4c9954e182fe5aef2b7b9b6250c13b21aa68a61bc666add7b820f62ebe9ae308d7fc73425d56e0c1ddf3fbbc7c009bb6f7aa106113e9864e5365d", 0x3d}, {&(0x7f00000003c0)="5b88dc90cebaa98d25ff00a50fe38e9f8d1b5fd4b37147e9045c519f00195c57bbc2aa95c3df7089b73be678e4369c553c468f2f5d747f6a3ca9a809d8", 0x3d}, {&(0x7f0000000400)="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", 0xfd}, {&(0x7f0000000500)="993cbbef4a2373c6cf571f17f20c71c54cdaadf1ab53f7d14bdb65188825c59a475d0f2f603a755e6d3f48cb1933c6c56868f2653383e11929d658fd1836f6392b84787a4e1845b11014867077dce5e0ca798ae0d1366d75ba1f231c510ad2e4505533f9ee16380374624399693d82a177522bf0fe76f0cc6345a2fef4f89a9f5e18233fcef34cdb138ff78e7b1af190a9e09d25ba2a6d741b5bb7bf8492cedf7ba02d25a19fc8eb635b361a", 0xac}, {&(0x7f00000005c0)="f0b4efd16ab8686f1c1a0c55ed6f8638a33ad69eb286c2c0d98ac4707bc3155e3b7e95709e2c8921176662822c", 0x2d}, {&(0x7f0000000600)="b43bb869b44333a90b0a6a8a541f77ca5f5b06afd15d9e595d3de0f227da0dfcc5bb351fff65a4a682ce1b5f6db0b8542a6808b75df65c620b2bb58d7df4284acd4d296a7cac54e11dd04c8174fb16c552b6a632c3a1a8247ababedf48e4768a818813fdb545a30d9954104e3c34b48b337fbab4d5efce83815bb81d5f7b21d9ed9ba13b24fdf60159f6d61a41f5ef527759f65f2cb9ede6db14faa4f720d7ecb7f24aad0543261b9cf7f29c0b77b5ef254756a47c0582", 0xb7}], 0x8, &(0x7f00000001c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x1, 0x0) [ 379.248581][T20153] kasan: CONFIG_KASAN_INLINE enabled [ 379.284883][T20153] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 379.324467][T20160] autofs4:pid:20160:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.122), cmd(0x0000937e) [ 379.335702][T20153] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 379.344737][T20153] CPU: 1 PID: 20153 Comm: syz-executor.2 Not tainted 5.2.0-next-20190718 #41 [ 379.353498][T20153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.361733][ T3901] kobject: 'loop5' (0000000065186dc6): kobject_uevent_env [ 379.363573][T20153] RIP: 0010:kstrtouint+0x85/0x1a0 [ 379.363594][T20153] Code: 04 00 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 2c 31 35 fe 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 4c 89 e2 83 e2 07 38 d0 7f 08 84 c0 0f 85 db 00 00 00 [ 379.388426][ T3901] kobject: 'loop5' (0000000065186dc6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 379.395757][T20153] RSP: 0018:ffff888086ef79e0 EFLAGS: 00010246 [ 379.395771][T20153] RAX: dffffc0000000000 RBX: ffff888086ef7b38 RCX: ffffc9000a367000 [ 379.395778][T20153] RDX: 0000000000000000 RSI: ffffffff833d53c4 RDI: 0000000000000000 [ 379.395785][T20153] RBP: ffff888086ef7a70 R08: ffff8880a137e400 R09: ffffed1015d26c7c [ 379.395792][T20153] R10: ffffed1015d26c7b R11: ffff8880ae9363db R12: 0000000000000000 [ 379.395799][T20153] R13: 1ffff11010ddef3d R14: ffff888086ef7a48 R15: 0000000000000000 [ 379.395810][T20153] FS: 00007f0935f83700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 379.395817][T20153] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 379.395825][T20153] CR2: 000000000070f158 CR3: 000000009c88a000 CR4: 00000000001406e0 [ 379.395841][T20153] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 379.406157][T20160] autofs4:pid:20160:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 379.412038][T20153] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 379.412044][T20153] Call Trace: [ 379.412069][T20153] ? __x64_sys_mount+0xbe/0x150 [ 379.412086][T20153] ? _kstrtoul+0x170/0x170 [ 379.412110][T20153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.471122][T20159] kobject: '0:46' (000000000aae2d2c): kobject_add_internal: parent: 'bdi', set: 'devices' [ 379.475722][T20153] fs_parse+0xde1/0x1080 [ 379.475742][T20153] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.475775][T20153] fuse_parse_param+0xac/0x750 [ 379.499325][T20159] kobject: '0:46' (000000000aae2d2c): kobject_uevent_env [ 379.503080][T20153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.503097][T20153] ? process_init_reply+0x1650/0x1650 [ 379.503112][T20153] ? __sanitizer_cov_trace_cmp8+0x18/0x20 01:22:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x2, 0x0, 0x0) [ 379.503128][T20153] ? __lookup_constant+0xd6/0x100 [ 379.503142][T20153] ? process_init_reply+0x1650/0x1650 [ 379.503164][T20153] vfs_parse_fs_param+0x2ca/0x540 [ 379.510629][T20159] kobject: '0:46' (000000000aae2d2c): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 379.511296][T20153] vfs_parse_fs_string+0x105/0x170 [ 379.543924][T20159] kobject: '0:47' (000000000e4ee94c): kobject_add_internal: parent: 'bdi', set: 'devices' [ 379.546883][T20153] ? vfs_parse_fs_param+0x540/0x540 [ 379.546907][T20153] ? vfs_parse_fs_string+0x111/0x170 01:22:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}], 0x2, 0x0, 0x0) [ 379.583504][T20159] kobject: '0:47' (000000000e4ee94c): kobject_uevent_env [ 379.586580][T20153] ? rcu_read_lock_sched_held+0x110/0x130 [ 379.586605][T20153] generic_parse_monolithic+0x181/0x200 [ 379.618642][T20159] kobject: '0:47' (000000000e4ee94c): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 379.621814][T20153] ? vfs_parse_fs_string+0x170/0x170 [ 379.621833][T20153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.621847][T20153] ? alloc_fs_context+0x400/0x690 [ 379.621862][T20153] ? vfs_parse_fs_string+0x170/0x170 01:22:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000300)) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, r2, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffffffffffda}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x10001}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x1}, 0x4000) read$FUSE(r0, &(0x7f0000000440), 0x1000) [ 379.621882][T20153] parse_monolithic_mount_data+0x69/0x90 [ 379.651868][ T3901] kobject: 'loop1' (00000000a9f98e38): kobject_uevent_env [ 379.655186][T20153] do_mount+0x1369/0x1c30 [ 379.655207][T20153] ? copy_mount_string+0x40/0x40 [ 379.675954][ T3901] kobject: 'loop1' (00000000a9f98e38): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 379.677349][T20153] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 379.677372][T20153] ? _copy_from_user+0x12c/0x1a0 [ 379.715003][T20153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.721242][T20153] ? copy_mount_options+0x2e8/0x3f0 01:22:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 379.726449][T20153] ksys_mount+0xdb/0x150 [ 379.730700][T20153] __x64_sys_mount+0xbe/0x150 [ 379.735392][T20153] do_syscall_64+0xfd/0x6a0 [ 379.739911][T20153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.745831][T20153] RIP: 0033:0x459819 [ 379.749732][T20153] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 379.754571][ T3901] kobject: 'loop5' (0000000065186dc6): kobject_uevent_env [ 379.769369][T20153] RSP: 002b:00007f0935f82c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 379.769384][T20153] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459819 [ 379.769391][T20153] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 379.769397][T20153] RBP: 000000000075bf20 R08: 0000000020001440 R09: 0000000000000000 [ 379.769404][T20153] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0935f836d4 01:22:23 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000300007f") 01:22:23 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'em1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0vboxnet1selfeth0^,\\&$ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x401}}]}}) [ 379.769411][T20153] R13: 00000000004c5cc9 R14: 00000000004da570 R15: 00000000ffffffff [ 379.769424][T20153] Modules linked in: [ 379.821935][T20153] ---[ end trace 26c8be3988af45f3 ]--- [ 379.851721][ T9037] kobject: '0:47' (000000000e4ee94c): kobject_uevent_env [ 379.858819][ T9037] kobject: '0:47' (000000000e4ee94c): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 379.868181][T20153] RIP: 0010:kstrtouint+0x85/0x1a0 01:22:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94", 0x5) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x3c8) recvmmsg(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/18, 0x12}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x2, 0x0, 0x0) [ 379.880432][T20153] Code: 04 00 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 2c 31 35 fe 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 4c 89 e2 83 e2 07 38 d0 7f 08 84 c0 0f 85 db 00 00 00 [ 379.901708][ T9037] kobject: '0:47' (000000000e4ee94c): kobject_cleanup, parent 000000001eeb9f94 [ 379.911115][T20183] autofs4:pid:20183:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.768), cmd(0x0000937e) 01:22:23 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 379.925460][ T9037] kobject: '0:47' (000000000e4ee94c): calling ktype release [ 379.939340][ T9037] kobject: '0:47': free name [ 379.950005][T20183] autofs4:pid:20183:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 379.961725][ T9037] kobject: '0:46' (000000000aae2d2c): kobject_uevent_env [ 379.970320][ T9037] kobject: '0:46' (000000000aae2d2c): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 379.980336][T20153] RSP: 0018:ffff888086ef79e0 EFLAGS: 00010246 [ 379.993812][T20153] RAX: dffffc0000000000 RBX: ffff888086ef7b38 RCX: ffffc9000a367000 [ 380.002630][ T9037] kobject: '0:46' (000000000aae2d2c): kobject_cleanup, parent 000000001eeb9f94 [ 380.019483][T20191] fuse: Missing mount parameter(s) [ 380.025007][T20153] RDX: 0000000000000000 RSI: ffffffff833d53c4 RDI: 0000000000000000 [ 380.025689][ T3901] kobject: 'loop5' (0000000065186dc6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 380.040410][ T9037] kobject: '0:46' (000000000aae2d2c): calling ktype release [ 380.049143][ T3901] kobject: 'loop4' (000000002d9f46bf): kobject_uevent_env [ 380.058234][ T3901] kobject: 'loop4' (000000002d9f46bf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 380.061516][ T9037] kobject: '0:46': free name [ 380.073312][T20153] RBP: ffff888086ef7a70 R08: ffff8880a137e400 R09: ffffed1015d26c7c [ 380.073900][ T3901] kobject: 'loop3' (000000005379470c): kobject_uevent_env [ 380.081290][T20153] R10: ffffed1015d26c7b R11: ffff8880ae9363db R12: 0000000000000000 [ 380.081298][T20153] R13: 1ffff11010ddef3d R14: ffff888086ef7a48 R15: 0000000000000000 [ 380.081311][T20153] FS: 00007f0935f83700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 380.081319][T20153] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 380.081335][T20153] CR2: 0000001b31424000 CR3: 000000009c88a000 CR4: 00000000001406e0 [ 380.092192][ T3901] kobject: 'loop3' (000000005379470c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 380.132886][T20193] kobject: '0:46' (0000000018ab08ec): kobject_add_internal: parent: 'bdi', set: 'devices' [ 380.143371][ T3901] kobject: 'loop1' (00000000a9f98e38): kobject_uevent_env [ 380.148554][T20153] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 380.157821][ T3901] kobject: 'loop1' (00000000a9f98e38): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 380.163658][T20153] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 380.177580][ T3901] kobject: 'loop5' (0000000065186dc6): kobject_uevent_env [ 380.183052][T20193] kobject: '0:46' (0000000018ab08ec): kobject_uevent_env [ 380.191078][ T3901] kobject: 'loop5' (0000000065186dc6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 380.195888][T20153] Kernel panic - not syncing: Fatal exception [ 380.210022][ T3901] kobject: 'loop4' (000000002d9f46bf): kobject_uevent_env [ 380.213187][T20153] Kernel Offset: disabled [ 380.224584][T20153] Rebooting in 86400 seconds..