sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$eJzs201vVFUfAPD/vdMC5eVp4cEXELWKRuJLSwsqCzcYTdiYmOgCl7UUggzU0JoIIVKNwaUhfgB1aeIncIUbo6w0bnVvTIhhI7owY+7MvWVoZ+pMp9OhzO+X3Pace0/vOf/ee2bOPWcmgL41mv1IIrZHxC8RMVzL3llgtPbr1s1L03/dvDSdRKXyxh9JtdyfNy9NF0U/Gxqq/t6Wn3MgItKPkyUnrJm7cPHMVLk8cz7Pj8+ffXd87sLF506fnTo1c2rm3OSRI4cPTbz4wuTzaxLnjqytez+Y3bfn2FtXX5s+fvXtH77OmrU9P14fR81Ix3WOxmij0Kue7Pjsd5frO2+nk4GGRa5tW7/m0KJS1PrpYLX/D0cpbl+84Xj1o542Dui2dPOyXaUisVAB7mHZaB7oR8Ubffb8W2zrOPbouRtHY3Ee41a+1Y4MRJo9w4/Uno12dKn+0Yg4vvD359kWDechAADW1rWjEfFso/FfGvfXlftfvjY0EhE7I2JXRPw/InZHxH0R1bIPRMSDbdY/uiS/fPzz09CqAmtRNv57KV/bunP8lxZFRkp5bkc1/sHk5OnyzMH8f3IgBjdn+YkV6vj2lZ8/bXasfvyXbVn9xVgwb8fvA0sm6E5MzU91EnO9Gx9G7B1oFH+yuBKQjY/3RMTeVZw/u3inn/5qX7Pj/x3/ChqvM7Wl8mXEU7XrvxBL4i8kK69Pjm+J8szB8eKuWO76j1deb1Z/R/Gvgez6b214/y/GP5LUr9fOtV/HlV8/afpMs9r7f1PyZjW9Kd/3/tT8/PmJiE3JwvL9k7f/tsgX5bP4D+xv3P93RfzzRf53D0VEdhM/HBGPRMSjedsfi4jHI2L/CvF///IT76w+/u7K4j/R1vVvP1E68903zepv7fofrqYO5Htaef1rtYGd/O8AAABgo0irn4FP0rHFdJqOjdU+w787tqbl2bn5Z07OvnfuRO2z8iMxmBYzXcN186ET+dxwkZ9ckj9UnTeuVCqVoWp+bHq23K01daA125r0/8xvpV63Dui6ltbRikWYZt9oAzakNVhHBzYo/R/6l/4P/Uv/h/7VqP9fjrjVg6YA68z7P/Qv/R/6l/4P/Uv/h77Uyff6V0rsOtatM99ridLd0Yy2E5HeFc1YXSJtdGhLRPSiPZsjotXCl9ethb1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgb/wYAAP//EUHlYw==") (fail_nth: 73) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:08 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82a, 0x0, 0x7, 0x2}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3403f9ec473bd5a6781c8301eb8eace86546c6f01a7e12d26bbb24fc90384418249de59e0940a75369c02e49c64287bce09af2a8d353265bae501c7f504306c76d5aaa050e13ceceea7d3408d1a706100da9c2d634e53769a26027a8e87be0254b927226a3eac2a67a2def84f646b7552a78c2431cdf8b3e0a7035e54a26e8dd51", @ANYRES32=r3, @ANYBLOB="30003300d080000008021100000008021100000150505050505000000000000303", @ANYBLOB="05"], 0x4c}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000240), 0x78d, &(0x7f0000533000/0x2000)=nil, 0x5d8d5a476200a02d) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x604000000000000, 0x0) 19:20:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x9}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 180.527971][ T7635] FAULT_INJECTION: forcing a failure. [ 180.527971][ T7635] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 180.541239][ T7635] CPU: 0 PID: 7635 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 180.551731][ T7635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 180.561854][ T7635] Call Trace: [ 180.565176][ T7635] [ 180.568145][ T7635] dump_stack_lvl+0xda/0x130 [ 180.572857][ T7635] dump_stack+0x15/0x20 [ 180.577064][ T7635] should_fail_ex+0x21f/0x230 [ 180.581816][ T7635] should_fail+0xb/0x10 [ 180.584917][ T7629] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 180.586098][ T7635] should_fail_usercopy+0x1a/0x20 [ 180.601639][ T7635] copy_page_from_iter_atomic+0x21c/0xcf0 [ 180.607511][ T7635] ? shmem_write_begin+0xa6/0x210 [ 180.612603][ T7635] ? shmem_write_begin+0x16d/0x210 [ 180.617785][ T7635] generic_perform_write+0x20c/0x410 [ 180.623163][ T7635] ? shmem_write_begin+0x210/0x210 [ 180.628351][ T7635] shmem_file_write_iter+0xc8/0xe0 [ 180.633530][ T7635] vfs_write+0x4ab/0x7d0 [ 180.637876][ T7635] ksys_write+0xeb/0x1a0 [ 180.642196][ T7635] __x64_sys_write+0x42/0x50 [ 180.646853][ T7635] do_syscall_64+0x41/0xc0 [ 180.651315][ T7635] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 180.657248][ T7635] RIP: 0033:0x7ffa16ca582f 19:20:08 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:08 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0xa}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0xb}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 180.661702][ T7635] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 180.681631][ T7635] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 180.690118][ T7635] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 180.698116][ T7635] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 180.706138][ T7635] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 180.714156][ T7635] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 19:20:08 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2c, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 180.722173][ T7635] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 180.730264][ T7635] [ 180.737673][ T7635] loop2: detected capacity change from 0 to 512 [ 180.761232][ T7635] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 180.770042][ T7635] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 180.800613][ T7635] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x40000, 0x0) 19:20:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x10}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:09 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2c, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$eJzs201vVFUfAPD/vdMC5eVp4cEXELWKRuJLSwsqCzcYTdiYmOgCl7UUggzU0JoIIVKNwaUhfgB1aeIncIUbo6w0bnVvTIhhI7owY+7MvWVoZ+pMp9OhzO+X3Pace0/vOf/ee2bOPWcmgL41mv1IIrZHxC8RMVzL3llgtPbr1s1L03/dvDSdRKXyxh9JtdyfNy9NF0U/Gxqq/t6Wn3MgItKPkyUnrJm7cPHMVLk8cz7Pj8+ffXd87sLF506fnTo1c2rm3OSRI4cPTbz4wuTzaxLnjqytez+Y3bfn2FtXX5s+fvXtH77OmrU9P14fR81Ix3WOxmij0Kue7Pjsd5frO2+nk4GGRa5tW7/m0KJS1PrpYLX/D0cpbl+84Xj1o542Dui2dPOyXaUisVAB7mHZaB7oR8Ubffb8W2zrOPbouRtHY3Ee41a+1Y4MRJo9w4/Uno12dKn+0Yg4vvD359kWDechAADW1rWjEfFso/FfGvfXlftfvjY0EhE7I2JXRPw/InZHxH0R1bIPRMSDbdY/uiS/fPzz09CqAmtRNv57KV/bunP8lxZFRkp5bkc1/sHk5OnyzMH8f3IgBjdn+YkV6vj2lZ8/bXasfvyXbVn9xVgwb8fvA0sm6E5MzU91EnO9Gx9G7B1oFH+yuBKQjY/3RMTeVZw/u3inn/5qX7Pj/x3/ChqvM7Wl8mXEU7XrvxBL4i8kK69Pjm+J8szB8eKuWO76j1deb1Z/R/Gvgez6b214/y/GP5LUr9fOtV/HlV8/afpMs9r7f1PyZjW9Kd/3/tT8/PmJiE3JwvL9k7f/tsgX5bP4D+xv3P93RfzzRf53D0VEdhM/HBGPRMSjedsfi4jHI2L/CvF///IT76w+/u7K4j/R1vVvP1E68903zepv7fofrqYO5Htaef1rtYGd/O8AAABgo0irn4FP0rHFdJqOjdU+w787tqbl2bn5Z07OvnfuRO2z8iMxmBYzXcN186ET+dxwkZ9ckj9UnTeuVCqVoWp+bHq23K01daA125r0/8xvpV63Dui6ltbRikWYZt9oAzakNVhHBzYo/R/6l/4P/Uv/h/7VqP9fjrjVg6YA68z7P/Qv/R/6l/4P/Uv/h77Uyff6V0rsOtatM99ridLd0Yy2E5HeFc1YXSJtdGhLRPSiPZsjotXCl9ethb1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgb/wYAAP//EUHlYw==") (fail_nth: 74) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:09 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3403f9ec473bd5a6781c8301eb8eace86546c6f01a7e12d26bbb24fc90384418249de59e0940a75369c02e49c64287bce09af2a8d353265bae501c7f504306c76d5aaa050e13ceceea7d3408d1a706100da9c2d634e53769a26027a8e87be0254b927226a3eac2a67a2def84f646b7552a78c2431cdf8b3e0a7035e54a26e8dd51", @ANYRES32=r3, @ANYBLOB="30003300d080000008021100000008021100000150505050505000000000000303", @ANYBLOB="05"], 0x4c}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000240), 0x78d, &(0x7f0000533000/0x2000)=nil, 0x5d8d5a476200a02d) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x700000000000000, 0x0) [ 181.391594][ T7665] FAULT_INJECTION: forcing a failure. [ 181.391594][ T7665] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 181.404934][ T7665] CPU: 0 PID: 7665 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 181.415492][ T7665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 181.425698][ T7665] Call Trace: [ 181.429010][ T7665] [ 181.431979][ T7665] dump_stack_lvl+0xda/0x130 [ 181.436646][ T7665] dump_stack+0x15/0x20 19:20:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x11}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:09 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2c, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 181.440840][ T7665] should_fail_ex+0x21f/0x230 [ 181.445561][ T7665] __should_fail_alloc_page+0xfd/0x110 [ 181.451134][ T7665] __alloc_pages+0x108/0x340 [ 181.455817][ T7665] vma_alloc_folio+0x6a3/0x8c0 [ 181.459772][ T7667] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 181.460801][ T7665] ? shmem_inode_acct_block+0x1f5/0x220 [ 181.477154][ T7665] shmem_get_folio_gfp+0x579/0xc30 [ 181.482412][ T7665] shmem_write_begin+0xa6/0x210 [ 181.487316][ T7665] generic_perform_write+0x1c9/0x410 [ 181.492805][ T7665] ? shmem_write_begin+0x210/0x210 [ 181.498000][ T7665] shmem_file_write_iter+0xc8/0xe0 [ 181.503258][ T7665] vfs_write+0x4ab/0x7d0 [ 181.507566][ T7665] ksys_write+0xeb/0x1a0 [ 181.511937][ T7665] __x64_sys_write+0x42/0x50 [ 181.516582][ T7665] do_syscall_64+0x41/0xc0 [ 181.521043][ T7665] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 181.526993][ T7665] RIP: 0033:0x7ffa16ca582f 19:20:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x13}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 181.531489][ T7665] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 181.551288][ T7665] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 181.559805][ T7665] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 181.567860][ T7665] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 181.575876][ T7665] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 181.583961][ T7665] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 19:20:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x2}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:09 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 181.591979][ T7665] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 181.600085][ T7665] 19:20:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x1fffff, 0x0) 19:20:10 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$eJzs201vVFUfAPD/vdMC5eVp4cEXELWKRuJLSwsqCzcYTdiYmOgCl7UUggzU0JoIIVKNwaUhfgB1aeIncIUbo6w0bnVvTIhhI7owY+7MvWVoZ+pMp9OhzO+X3Pace0/vOf/ee2bOPWcmgL41mv1IIrZHxC8RMVzL3llgtPbr1s1L03/dvDSdRKXyxh9JtdyfNy9NF0U/Gxqq/t6Wn3MgItKPkyUnrJm7cPHMVLk8cz7Pj8+ffXd87sLF506fnTo1c2rm3OSRI4cPTbz4wuTzaxLnjqytez+Y3bfn2FtXX5s+fvXtH77OmrU9P14fR81Ix3WOxmij0Kue7Pjsd5frO2+nk4GGRa5tW7/m0KJS1PrpYLX/D0cpbl+84Xj1o542Dui2dPOyXaUisVAB7mHZaB7oR8Ubffb8W2zrOPbouRtHY3Ee41a+1Y4MRJo9w4/Uno12dKn+0Yg4vvD359kWDechAADW1rWjEfFso/FfGvfXlftfvjY0EhE7I2JXRPw/InZHxH0R1bIPRMSDbdY/uiS/fPzz09CqAmtRNv57KV/bunP8lxZFRkp5bkc1/sHk5OnyzMH8f3IgBjdn+YkV6vj2lZ8/bXasfvyXbVn9xVgwb8fvA0sm6E5MzU91EnO9Gx9G7B1oFH+yuBKQjY/3RMTeVZw/u3inn/5qX7Pj/x3/ChqvM7Wl8mXEU7XrvxBL4i8kK69Pjm+J8szB8eKuWO76j1deb1Z/R/Gvgez6b214/y/GP5LUr9fOtV/HlV8/afpMs9r7f1PyZjW9Kd/3/tT8/PmJiE3JwvL9k7f/tsgX5bP4D+xv3P93RfzzRf53D0VEdhM/HBGPRMSjedsfi4jHI2L/CvF///IT76w+/u7K4j/R1vVvP1E68903zepv7fofrqYO5Htaef1rtYGd/O8AAABgo0irn4FP0rHFdJqOjdU+w787tqbl2bn5Z07OvnfuRO2z8iMxmBYzXcN186ET+dxwkZ9ckj9UnTeuVCqVoWp+bHq23K01daA125r0/8xvpV63Dui6ltbRikWYZt9oAzakNVhHBzYo/R/6l/4P/Uv/h/7VqP9fjrjVg6YA68z7P/Qv/R/6l/4P/Uv/h77Uyff6V0rsOtatM99ridLd0Yy2E5HeFc1YXSJtdGhLRPSiPZsjotXCl9ethb1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgb/wYAAP//EUHlYw==") (fail_nth: 75) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x3}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:10 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3403f9ec473bd5a6781c8301eb8eace86546c6f01a7e12d26bbb24fc90384418249de59e0940a75369c02e49c64287bce09af2a8d353265bae501c7f504306c76d5aaa050e13ceceea7d3408d1a706100da9c2d634e53769a26027a8e87be0254b927226a3eac2a67a2def84f646b7552a78c2431cdf8b3e0a7035e54a26e8dd51", @ANYRES32=r3, @ANYBLOB="30003300d080000008021100000008021100000150505050505000000000000303", @ANYBLOB="05"], 0x4c}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000240), 0x78d, &(0x7f0000533000/0x2000)=nil, 0x5d8d5a476200a02d) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x2000000000000000, 0x0) 19:20:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x4}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:10 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) [ 182.269371][ T7697] FAULT_INJECTION: forcing a failure. [ 182.269371][ T7697] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 182.282558][ T7697] CPU: 1 PID: 7697 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 182.292994][ T7697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 182.303110][ T7697] Call Trace: [ 182.306426][ T7697] [ 182.309425][ T7697] dump_stack_lvl+0xda/0x130 [ 182.314088][ T7697] dump_stack+0x15/0x20 19:20:10 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:10 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 182.318294][ T7697] should_fail_ex+0x21f/0x230 [ 182.323047][ T7697] should_fail+0xb/0x10 [ 182.327245][ T7697] should_fail_usercopy+0x1a/0x20 [ 182.332437][ T7697] copy_page_from_iter_atomic+0x21c/0xcf0 [ 182.338207][ T7697] ? shmem_write_begin+0xa6/0x210 [ 182.343365][ T7697] ? shmem_write_begin+0x16d/0x210 [ 182.348604][ T7697] generic_perform_write+0x20c/0x410 [ 182.353936][ T7697] ? shmem_write_begin+0x210/0x210 [ 182.359107][ T7697] shmem_file_write_iter+0xc8/0xe0 [ 182.364348][ T7697] vfs_write+0x4ab/0x7d0 [ 182.368786][ T7697] ksys_write+0xeb/0x1a0 [ 182.373224][ T7697] __x64_sys_write+0x42/0x50 [ 182.377870][ T7697] do_syscall_64+0x41/0xc0 [ 182.382335][ T7697] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 182.388282][ T7697] RIP: 0033:0x7ffa16ca582f [ 182.392753][ T7697] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 182.412439][ T7697] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 182.418905][ T7699] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 182.420953][ T7697] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 182.420974][ T7697] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 182.420991][ T7697] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 182.455660][ T7697] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 19:20:10 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x5}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 182.463679][ T7697] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 182.471773][ T7697] [ 182.482695][ T7697] loop2: detected capacity change from 0 to 512 [ 182.502074][ T7697] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 182.511179][ T7697] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 182.540007][ T7697] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x1000000, 0x0) 19:20:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x6}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:11 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$eJzs201vVFUfAPD/vdMC5eVp4cEXELWKRuJLSwsqCzcYTdiYmOgCl7UUggzU0JoIIVKNwaUhfgB1aeIncIUbo6w0bnVvTIhhI7owY+7MvWVoZ+pMp9OhzO+X3Pace0/vOf/ee2bOPWcmgL41mv1IIrZHxC8RMVzL3llgtPbr1s1L03/dvDSdRKXyxh9JtdyfNy9NF0U/Gxqq/t6Wn3MgItKPkyUnrJm7cPHMVLk8cz7Pj8+ffXd87sLF506fnTo1c2rm3OSRI4cPTbz4wuTzaxLnjqytez+Y3bfn2FtXX5s+fvXtH77OmrU9P14fR81Ix3WOxmij0Kue7Pjsd5frO2+nk4GGRa5tW7/m0KJS1PrpYLX/D0cpbl+84Xj1o542Dui2dPOyXaUisVAB7mHZaB7oR8Ubffb8W2zrOPbouRtHY3Ee41a+1Y4MRJo9w4/Uno12dKn+0Yg4vvD359kWDechAADW1rWjEfFso/FfGvfXlftfvjY0EhE7I2JXRPw/InZHxH0R1bIPRMSDbdY/uiS/fPzz09CqAmtRNv57KV/bunP8lxZFRkp5bkc1/sHk5OnyzMH8f3IgBjdn+YkV6vj2lZ8/bXasfvyXbVn9xVgwb8fvA0sm6E5MzU91EnO9Gx9G7B1oFH+yuBKQjY/3RMTeVZw/u3inn/5qX7Pj/x3/ChqvM7Wl8mXEU7XrvxBL4i8kK69Pjm+J8szB8eKuWO76j1deb1Z/R/Gvgez6b214/y/GP5LUr9fOtV/HlV8/afpMs9r7f1PyZjW9Kd/3/tT8/PmJiE3JwvL9k7f/tsgX5bP4D+xv3P93RfzzRf53D0VEdhM/HBGPRMSjedsfi4jHI2L/CvF///IT76w+/u7K4j/R1vVvP1E68903zepv7fofrqYO5Htaef1rtYGd/O8AAABgo0irn4FP0rHFdJqOjdU+w787tqbl2bn5Z07OvnfuRO2z8iMxmBYzXcN186ET+dxwkZ9ckj9UnTeuVCqVoWp+bHq23K01daA125r0/8xvpV63Dui6ltbRikWYZt9oAzakNVhHBzYo/R/6l/4P/Uv/h/7VqP9fjrjVg6YA68z7P/Qv/R/6l/4P/Uv/h77Uyff6V0rsOtatM99ridLd0Yy2E5HeFc1YXSJtdGhLRPSiPZsjotXCl9ethb1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgb/wYAAP//EUHlYw==") (fail_nth: 76) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:11 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3403f9ec473bd5a6781c8301eb8eace86546c6f01a7e12d26bbb24fc90384418249de59e0940a75369c02e49c64287bce09af2a8d353265bae501c7f504306c76d5aaa050e13ceceea7d3408d1a706100da9c2d634e53769a26027a8e87be0254b927226a3eac2a67a2def84f646b7552a78c2431cdf8b3e0a7035e54a26e8dd51", @ANYRES32=r3, @ANYBLOB="30003300d080000008021100000008021100000150505050505000000000000303", @ANYBLOB="05"], 0x4c}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000240), 0x78d, &(0x7f0000533000/0x2000)=nil, 0x5d8d5a476200a02d) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x2010000000000000, 0x0) [ 183.132826][ T7726] FAULT_INJECTION: forcing a failure. [ 183.132826][ T7726] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 183.146334][ T7726] CPU: 1 PID: 7726 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 183.156715][ T7726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 183.166802][ T7726] Call Trace: [ 183.170104][ T7726] [ 183.173071][ T7726] dump_stack_lvl+0xda/0x130 [ 183.177708][ T7726] dump_stack+0x15/0x20 19:20:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x7}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:11 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 183.181896][ T7726] should_fail_ex+0x21f/0x230 [ 183.186649][ T7726] __should_fail_alloc_page+0xfd/0x110 [ 183.192199][ T7726] __alloc_pages+0x108/0x340 [ 183.196949][ T7726] vma_alloc_folio+0x6a3/0x8c0 [ 183.201860][ T7726] ? shmem_inode_acct_block+0x1f5/0x220 [ 183.207465][ T7726] shmem_get_folio_gfp+0x579/0xc30 [ 183.212684][ T7726] shmem_write_begin+0xa6/0x210 [ 183.217678][ T7726] generic_perform_write+0x1c9/0x410 19:20:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x8}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 183.220831][ T7729] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 183.222997][ T7726] ? shmem_write_begin+0x210/0x210 [ 183.239012][ T7726] shmem_file_write_iter+0xc8/0xe0 [ 183.244233][ T7726] vfs_write+0x4ab/0x7d0 [ 183.248520][ T7726] ksys_write+0xeb/0x1a0 [ 183.252834][ T7726] __x64_sys_write+0x42/0x50 [ 183.257552][ T7726] do_syscall_64+0x41/0xc0 [ 183.262019][ T7726] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 183.268082][ T7726] RIP: 0033:0x7ffa16ca582f [ 183.272676][ T7726] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 183.292311][ T7726] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 183.300829][ T7726] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 183.308963][ T7726] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 183.317017][ T7726] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 183.325011][ T7726] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 19:20:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 77) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) [ 183.333101][ T7726] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 183.341167][ T7726] 19:20:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x9}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0xf}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 183.385169][ T7744] FAULT_INJECTION: forcing a failure. [ 183.385169][ T7744] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 183.398335][ T7744] CPU: 1 PID: 7744 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 183.408781][ T7744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 183.418966][ T7744] Call Trace: [ 183.422298][ T7744] [ 183.425465][ T7744] dump_stack_lvl+0xda/0x130 [ 183.430092][ T7744] dump_stack+0x15/0x20 [ 183.434284][ T7744] should_fail_ex+0x21f/0x230 [ 183.439003][ T7744] should_fail+0xb/0x10 [ 183.443254][ T7744] should_fail_usercopy+0x1a/0x20 [ 183.448319][ T7744] copy_page_from_iter_atomic+0x21c/0xcf0 [ 183.454159][ T7744] ? shmem_write_begin+0xa6/0x210 [ 183.459332][ T7744] ? shmem_write_begin+0x16d/0x210 [ 183.464522][ T7744] generic_perform_write+0x20c/0x410 [ 183.469913][ T7744] ? shmem_write_begin+0x210/0x210 [ 183.475105][ T7744] shmem_file_write_iter+0xc8/0xe0 [ 183.480401][ T7744] vfs_write+0x4ab/0x7d0 [ 183.484670][ T7744] ksys_write+0xeb/0x1a0 [ 183.488937][ T7744] __x64_sys_write+0x42/0x50 [ 183.493847][ T7744] do_syscall_64+0x41/0xc0 [ 183.498291][ T7744] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 183.504229][ T7744] RIP: 0033:0x7ffa16ca582f [ 183.508685][ T7744] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 183.528426][ T7744] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 183.536867][ T7744] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 183.544982][ T7744] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 183.552985][ T7744] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 183.561035][ T7744] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 183.569159][ T7744] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 183.577179][ T7744] [ 183.582975][ T7744] loop2: detected capacity change from 0 to 512 [ 183.590937][ T7744] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 183.599950][ T7744] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 183.627496][ T7744] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x30}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x2000000, 0x0) 19:20:12 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:12 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3403f9ec473bd5a6781c8301eb8eace86546c6f01a7e12d26bbb24fc90384418249de59e0940a75369c02e49c64287bce09af2a8d353265bae501c7f504306c76d5aaa050e13ceceea7d3408d1a706100da9c2d634e53769a26027a8e87be0254b927226a3eac2a67a2def84f646b7552a78c2431cdf8b3e0a7035e54a26e8dd51", @ANYRES32=r3, @ANYBLOB="30003300d080000008021100000008021100000150505050505000000000000303", @ANYBLOB="05"], 0x4c}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000240), 0x78d, &(0x7f0000533000/0x2000)=nil, 0x5d8d5a476200a02d) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 78) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x3f00000000000000, 0x0) 19:20:12 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, 0x0, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 184.242936][ T7763] FAULT_INJECTION: forcing a failure. [ 184.242936][ T7763] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 184.256338][ T7763] CPU: 0 PID: 7763 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 184.266699][ T7763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 184.276805][ T7763] Call Trace: [ 184.280143][ T7763] [ 184.283168][ T7763] dump_stack_lvl+0xda/0x130 [ 184.287854][ T7763] dump_stack+0x15/0x20 19:20:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x44}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:12 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, 0x0, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 184.292048][ T7763] should_fail_ex+0x21f/0x230 [ 184.296803][ T7763] __should_fail_alloc_page+0xfd/0x110 [ 184.302485][ T7763] __alloc_pages+0x108/0x340 [ 184.307150][ T7763] vma_alloc_folio+0x6a3/0x8c0 [ 184.312066][ T7763] ? shmem_inode_acct_block+0x1f5/0x220 [ 184.317686][ T7763] shmem_get_folio_gfp+0x579/0xc30 [ 184.322973][ T7763] shmem_write_begin+0xa6/0x210 [ 184.327967][ T7763] generic_perform_write+0x1c9/0x410 [ 184.333299][ T7763] ? shmem_write_begin+0x210/0x210 [ 184.338552][ T7763] shmem_file_write_iter+0xc8/0xe0 [ 184.343823][ T7763] vfs_write+0x4ab/0x7d0 [ 184.348224][ T7763] ksys_write+0xeb/0x1a0 [ 184.352613][ T7763] __x64_sys_write+0x42/0x50 [ 184.357289][ T7763] do_syscall_64+0x41/0xc0 [ 184.361803][ T7763] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 184.367756][ T7763] RIP: 0033:0x7ffa16ca582f [ 184.372306][ T7763] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 184.391965][ T7763] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 184.400515][ T7763] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 184.408518][ T7763] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 184.416529][ T7763] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 184.422267][ T7756] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 184.424572][ T7763] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 19:20:12 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, 0x0, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x2040000, 0x0) 19:20:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x60}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 79) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) [ 184.424591][ T7763] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 184.424621][ T7763] 19:20:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:12 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 184.528560][ T7784] FAULT_INJECTION: forcing a failure. [ 184.528560][ T7784] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 184.541766][ T7784] CPU: 0 PID: 7784 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 184.552137][ T7784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 184.562245][ T7784] Call Trace: [ 184.565550][ T7784] [ 184.568509][ T7784] dump_stack_lvl+0xda/0x130 [ 184.573141][ T7784] dump_stack+0x15/0x20 [ 184.577441][ T7784] should_fail_ex+0x21f/0x230 [ 184.582230][ T7784] should_fail+0xb/0x10 [ 184.586525][ T7784] should_fail_usercopy+0x1a/0x20 [ 184.591716][ T7784] copy_page_from_iter_atomic+0x21c/0xcf0 [ 184.597759][ T7784] ? shmem_write_begin+0xa6/0x210 [ 184.602906][ T7784] ? shmem_write_begin+0x16d/0x210 [ 184.608130][ T7784] generic_perform_write+0x20c/0x410 [ 184.613478][ T7784] ? shmem_write_begin+0x210/0x210 [ 184.618829][ T7784] shmem_file_write_iter+0xc8/0xe0 [ 184.623988][ T7784] vfs_write+0x4ab/0x7d0 [ 184.628289][ T7784] ksys_write+0xeb/0x1a0 [ 184.632559][ T7784] __x64_sys_write+0x42/0x50 [ 184.637202][ T7784] do_syscall_64+0x41/0xc0 [ 184.641755][ T7784] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 184.647710][ T7784] RIP: 0033:0x7ffa16ca582f [ 184.652154][ T7784] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 184.671905][ T7784] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 184.680413][ T7784] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 184.688398][ T7784] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 184.696471][ T7784] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 184.704549][ T7784] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 184.712607][ T7784] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 184.720617][ T7784] 19:20:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x2}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:12 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 184.726337][ T7784] loop2: detected capacity change from 0 to 512 [ 184.734267][ T7784] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 184.743493][ T7784] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 184.768645][ T7784] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x4000000000000000, 0x0) 19:20:13 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3403f9ec473bd5a6781c8301eb8eace86546c6f01a7e12d26bbb24fc90384418249de59e0940a75369c02e49c64287bce09af2a8d353265bae501c7f504306c76d5aaa050e13ceceea7d3408d1a706100da9c2d634e53769a26027a8e87be0254b927226a3eac2a67a2def84f646b7552a78c2431cdf8b3e0a7035e54a26e8dd51", @ANYRES32=r3, @ANYBLOB="30003300d080000008021100000008021100000150505050505000000000000303", @ANYBLOB="05"], 0x4c}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000240), 0x78d, &(0x7f0000533000/0x2000)=nil, 0x5d8d5a476200a02d) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x3}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:13 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$eJzs201vVFUfAPD/vdMC5eVp4cEXELWKRuJLSwsqCzcYTdiYmOgCl7UUggzU0JoIIVKNwaUhfgB1aeIncIUbo6w0bnVvTIhhI7owY+7MvWVoZ+pMp9OhzO+X3Pace0/vOf/ee2bOPWcmgL41mv1IIrZHxC8RMVzL3llgtPbr1s1L03/dvDSdRKXyxh9JtdyfNy9NF0U/Gxqq/t6Wn3MgItKPkyUnrJm7cPHMVLk8cz7Pj8+ffXd87sLF506fnTo1c2rm3OSRI4cPTbz4wuTzaxLnjqytez+Y3bfn2FtXX5s+fvXtH77OmrU9P14fR81Ix3WOxmij0Kue7Pjsd5frO2+nk4GGRa5tW7/m0KJS1PrpYLX/D0cpbl+84Xj1o542Dui2dPOyXaUisVAB7mHZaB7oR8Ubffb8W2zrOPbouRtHY3Ee41a+1Y4MRJo9w4/Uno12dKn+0Yg4vvD359kWDechAADW1rWjEfFso/FfGvfXlftfvjY0EhE7I2JXRPw/InZHxH0R1bIPRMSDbdY/uiS/fPzz09CqAmtRNv57KV/bunP8lxZFRkp5bkc1/sHk5OnyzMH8f3IgBjdn+YkV6vj2lZ8/bXasfvyXbVn9xVgwb8fvA0sm6E5MzU91EnO9Gx9G7B1oFH+yuBKQjY/3RMTeVZw/u3inn/5qX7Pj/x3/ChqvM7Wl8mXEU7XrvxBL4i8kK69Pjm+J8szB8eKuWO76j1deb1Z/R/Gvgez6b214/y/GP5LUr9fOtV/HlV8/afpMs9r7f1PyZjW9Kd/3/tT8/PmJiE3JwvL9k7f/tsgX5bP4D+xv3P93RfzzRf53D0VEdhM/HBGPRMSjedsfi4jHI2L/CvF///IT76w+/u7K4j/R1vVvP1E68903zepv7fofrqYO5Htaef1rtYGd/O8AAABgo0irn4FP0rHFdJqOjdU+w787tqbl2bn5Z07OvnfuRO2z8iMxmBYzXcN186ET+dxwkZ9ckj9UnTeuVCqVoWp+bHq23K01daA125r0/8xvpV63Dui6ltbRikWYZt9oAzakNVhHBzYo/R/6l/4P/Uv/h/7VqP9fjrjVg6YA68z7P/Qv/R/6l/4P/Uv/h77Uyff6V0rsOtatM99ridLd0Yy2E5HeFc1YXSJtdGhLRPSiPZsjotXCl9ethb1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgb/wYAAP//EUHlYw==") (fail_nth: 80) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) [ 185.100567][ T7807] FAULT_INJECTION: forcing a failure. [ 185.100567][ T7807] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 185.113909][ T7807] CPU: 0 PID: 7807 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 185.124334][ T7807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 185.134558][ T7807] Call Trace: [ 185.137917][ T7807] [ 185.140931][ T7807] dump_stack_lvl+0xda/0x130 [ 185.145652][ T7807] dump_stack+0x15/0x20 [ 185.149996][ T7807] should_fail_ex+0x21f/0x230 [ 185.154732][ T7807] __should_fail_alloc_page+0xfd/0x110 [ 185.160302][ T7807] __alloc_pages+0x108/0x340 [ 185.164939][ T7807] vma_alloc_folio+0x6a3/0x8c0 [ 185.169866][ T7807] ? shmem_inode_acct_block+0x1f5/0x220 [ 185.175533][ T7807] shmem_get_folio_gfp+0x579/0xc30 [ 185.180731][ T7807] shmem_write_begin+0xa6/0x210 [ 185.181849][ T7800] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 185.185611][ T7807] generic_perform_write+0x1c9/0x410 [ 185.185645][ T7807] ? shmem_write_begin+0x210/0x210 [ 185.206617][ T7807] shmem_file_write_iter+0xc8/0xe0 [ 185.211823][ T7807] vfs_write+0x4ab/0x7d0 [ 185.216170][ T7807] ksys_write+0xeb/0x1a0 [ 185.220452][ T7807] __x64_sys_write+0x42/0x50 [ 185.225075][ T7807] do_syscall_64+0x41/0xc0 [ 185.229521][ T7807] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 185.235452][ T7807] RIP: 0033:0x7ffa16ca582f [ 185.239871][ T7807] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 185.259581][ T7807] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 185.268109][ T7807] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 185.276166][ T7807] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 185.284164][ T7807] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 185.292152][ T7807] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 19:20:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x6000000, 0x0) 19:20:13 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, 0x0, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 185.300202][ T7807] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 185.308433][ T7807] 19:20:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x4}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 81) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x5}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:13 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, 0x0, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) [ 185.378772][ T7815] FAULT_INJECTION: forcing a failure. [ 185.378772][ T7815] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 185.391940][ T7815] CPU: 0 PID: 7815 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 185.402415][ T7815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 185.412567][ T7815] Call Trace: [ 185.415879][ T7815] [ 185.418891][ T7815] dump_stack_lvl+0xda/0x130 [ 185.423591][ T7815] dump_stack+0x15/0x20 19:20:13 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, 0x0, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 185.427876][ T7815] should_fail_ex+0x21f/0x230 [ 185.432617][ T7815] should_fail+0xb/0x10 [ 185.436816][ T7815] should_fail_usercopy+0x1a/0x20 [ 185.441976][ T7815] copy_page_from_iter_atomic+0x21c/0xcf0 [ 185.447897][ T7815] ? shmem_write_begin+0xa6/0x210 [ 185.453045][ T7815] ? shmem_write_begin+0x16d/0x210 [ 185.458233][ T7815] generic_perform_write+0x20c/0x410 [ 185.463686][ T7815] ? shmem_write_begin+0x210/0x210 [ 185.468924][ T7815] shmem_file_write_iter+0xc8/0xe0 [ 185.474092][ T7815] vfs_write+0x4ab/0x7d0 [ 185.478442][ T7815] ksys_write+0xeb/0x1a0 [ 185.482744][ T7815] __x64_sys_write+0x42/0x50 [ 185.487376][ T7815] do_syscall_64+0x41/0xc0 [ 185.491933][ T7815] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 185.497889][ T7815] RIP: 0033:0x7ffa16ca582f [ 185.502413][ T7815] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 185.522090][ T7815] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 185.530538][ T7815] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 185.538547][ T7815] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 185.546574][ T7815] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 185.554578][ T7815] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 185.562623][ T7815] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 185.570630][ T7815] [ 185.575645][ T7815] loop2: detected capacity change from 0 to 512 [ 185.586894][ T7815] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 185.595702][ T7815] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 185.621053][ T7815] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x5100000000000000, 0x0) 19:20:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x6}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:13 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:13 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3403f9ec473bd5a6781c8301eb8eace86546c6f01a7e12d26bbb24fc90384418249de59e0940a75369c02e49c64287bce09af2a8d353265bae501c7f504306c76d5aaa050e13ceceea7d3408d1a706100da9c2d634e53769a26027a8e87be0254b927226a3eac2a67a2def84f646b7552a78c2431cdf8b3e0a7035e54a26e8dd51", @ANYRES32, @ANYBLOB="30003300d080000008021100000008021100000150505050505000000000000303", @ANYBLOB="05"], 0x4c}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000240), 0x78d, &(0x7f0000533000/0x2000)=nil, 0x5d8d5a476200a02d) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 82) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) [ 185.945801][ T7832] FAULT_INJECTION: forcing a failure. [ 185.945801][ T7832] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 185.959238][ T7832] CPU: 0 PID: 7832 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 185.969635][ T7832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 185.979740][ T7832] Call Trace: [ 185.983088][ T7832] [ 185.986038][ T7832] dump_stack_lvl+0xda/0x130 [ 185.990686][ T7832] dump_stack+0x15/0x20 [ 185.994910][ T7832] should_fail_ex+0x21f/0x230 [ 185.999628][ T7832] __should_fail_alloc_page+0xfd/0x110 [ 186.005166][ T7832] __alloc_pages+0x108/0x340 [ 186.009832][ T7832] vma_alloc_folio+0x6a3/0x8c0 [ 186.014676][ T7832] ? shmem_inode_acct_block+0x1f5/0x220 [ 186.020328][ T7832] shmem_get_folio_gfp+0x579/0xc30 [ 186.025597][ T7832] shmem_write_begin+0xa6/0x210 [ 186.030504][ T7832] generic_perform_write+0x1c9/0x410 [ 186.035916][ T7832] ? shmem_write_begin+0x210/0x210 [ 186.040186][ T7831] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 186.041057][ T7832] shmem_file_write_iter+0xc8/0xe0 [ 186.056757][ T7832] vfs_write+0x4ab/0x7d0 [ 186.061090][ T7832] ksys_write+0xeb/0x1a0 [ 186.065356][ T7832] __x64_sys_write+0x42/0x50 [ 186.070081][ T7832] do_syscall_64+0x41/0xc0 [ 186.074540][ T7832] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 186.080467][ T7832] RIP: 0033:0x7ffa16ca582f [ 186.084998][ T7832] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 186.104633][ T7832] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 186.113206][ T7832] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 186.121268][ T7832] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 186.129259][ T7832] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 186.137397][ T7832] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 186.145492][ T7832] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 186.153502][ T7832] 19:20:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x6040000, 0x0) 19:20:14 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x7}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 83) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x8}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 186.233455][ T7844] FAULT_INJECTION: forcing a failure. [ 186.233455][ T7844] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 186.246629][ T7844] CPU: 0 PID: 7844 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 186.257011][ T7844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 186.267338][ T7844] Call Trace: [ 186.270649][ T7844] [ 186.273601][ T7844] dump_stack_lvl+0xda/0x130 [ 186.278268][ T7844] dump_stack+0x15/0x20 19:20:14 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:14 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 186.282529][ T7844] should_fail_ex+0x21f/0x230 [ 186.287245][ T7844] should_fail+0xb/0x10 [ 186.291446][ T7844] should_fail_usercopy+0x1a/0x20 [ 186.296511][ T7844] copy_page_from_iter_atomic+0x21c/0xcf0 [ 186.302275][ T7844] ? shmem_write_begin+0xa6/0x210 [ 186.307380][ T7844] ? shmem_write_begin+0x16d/0x210 [ 186.312605][ T7844] generic_perform_write+0x20c/0x410 [ 186.317990][ T7844] ? shmem_write_begin+0x210/0x210 [ 186.323178][ T7844] shmem_file_write_iter+0xc8/0xe0 [ 186.328382][ T7844] vfs_write+0x4ab/0x7d0 [ 186.332686][ T7844] ksys_write+0xeb/0x1a0 [ 186.336996][ T7844] __x64_sys_write+0x42/0x50 [ 186.341635][ T7844] do_syscall_64+0x41/0xc0 [ 186.346107][ T7844] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 186.352055][ T7844] RIP: 0033:0x7ffa16ca582f [ 186.356514][ T7844] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 186.376152][ T7844] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 186.384630][ T7844] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 186.392871][ T7844] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 186.400877][ T7844] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 186.409078][ T7844] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 186.417142][ T7844] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 186.425655][ T7844] [ 186.433137][ T7844] loop2: detected capacity change from 0 to 512 [ 186.442633][ T7844] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 186.452381][ T7844] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 186.479095][ T7844] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x8cffffff00000000, 0x0) 19:20:14 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:14 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3403f9ec473bd5a6781c8301eb8eace86546c6f01a7e12d26bbb24fc90384418249de59e0940a75369c02e49c64287bce09af2a8d353265bae501c7f504306c76d5aaa050e13ceceea7d3408d1a706100da9c2d634e53769a26027a8e87be0254b927226a3eac2a67a2def84f646b7552a78c2431cdf8b3e0a7035e54a26e8dd51", @ANYRES32, @ANYBLOB="30003300d080000008021100000008021100000150505050505000000000000303", @ANYBLOB="05"], 0x4c}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000240), 0x78d, &(0x7f0000533000/0x2000)=nil, 0x5d8d5a476200a02d) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x9}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 84) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) [ 186.861286][ T7862] FAULT_INJECTION: forcing a failure. [ 186.861286][ T7862] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 186.875061][ T7862] CPU: 0 PID: 7862 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 186.885805][ T7862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 186.895992][ T7862] Call Trace: [ 186.899298][ T7862] [ 186.902317][ T7862] dump_stack_lvl+0xda/0x130 [ 186.907098][ T7862] dump_stack+0x15/0x20 [ 186.911461][ T7862] should_fail_ex+0x21f/0x230 [ 186.917011][ T7862] __should_fail_alloc_page+0xfd/0x110 [ 186.922739][ T7862] __alloc_pages+0x108/0x340 [ 186.923060][ T7865] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 186.927427][ T7862] vma_alloc_folio+0x6a3/0x8c0 [ 186.943066][ T7862] ? shmem_inode_acct_block+0x1f5/0x220 [ 186.948852][ T7862] shmem_get_folio_gfp+0x579/0xc30 [ 186.954198][ T7862] shmem_write_begin+0xa6/0x210 [ 186.959363][ T7862] generic_perform_write+0x1c9/0x410 [ 186.964756][ T7862] ? shmem_write_begin+0x210/0x210 [ 186.969919][ T7862] shmem_file_write_iter+0xc8/0xe0 [ 186.975083][ T7862] vfs_write+0x4ab/0x7d0 [ 186.979392][ T7862] ksys_write+0xeb/0x1a0 [ 186.983819][ T7862] __x64_sys_write+0x42/0x50 [ 186.988456][ T7862] do_syscall_64+0x41/0xc0 [ 186.993078][ T7862] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 186.999020][ T7862] RIP: 0033:0x7ffa16ca582f [ 187.003555][ T7862] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 187.024138][ T7862] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 187.032633][ T7862] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 187.040808][ T7862] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 187.049840][ T7862] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a 19:20:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 85) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x7000000, 0x0) 19:20:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0xf}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:15 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 187.059779][ T7862] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 187.067841][ T7862] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 187.075948][ T7862] 19:20:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x30}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:15 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 187.111127][ T7874] FAULT_INJECTION: forcing a failure. [ 187.111127][ T7874] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 187.124781][ T7874] CPU: 0 PID: 7874 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 187.135389][ T7874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 187.145842][ T7874] Call Trace: [ 187.149400][ T7874] [ 187.152363][ T7874] dump_stack_lvl+0xda/0x130 [ 187.156993][ T7874] dump_stack+0x15/0x20 19:20:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x44}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x60}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 187.161254][ T7874] should_fail_ex+0x21f/0x230 [ 187.166072][ T7874] should_fail+0xb/0x10 [ 187.170295][ T7874] should_fail_usercopy+0x1a/0x20 [ 187.175519][ T7874] copy_page_from_iter_atomic+0x21c/0xcf0 [ 187.181292][ T7874] ? shmem_write_begin+0xa6/0x210 [ 187.186370][ T7874] ? shmem_write_begin+0x16d/0x210 [ 187.191985][ T7874] generic_perform_write+0x20c/0x410 [ 187.197573][ T7874] ? shmem_write_begin+0x210/0x210 [ 187.202817][ T7874] shmem_file_write_iter+0xc8/0xe0 [ 187.208058][ T7874] vfs_write+0x4ab/0x7d0 [ 187.212343][ T7874] ksys_write+0xeb/0x1a0 [ 187.217168][ T7874] __x64_sys_write+0x42/0x50 [ 187.221807][ T7874] do_syscall_64+0x41/0xc0 [ 187.226273][ T7874] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 187.232267][ T7874] RIP: 0033:0x7ffa16ca582f [ 187.236710][ T7874] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 187.256417][ T7874] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 187.265005][ T7874] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 187.273203][ T7874] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 187.281281][ T7874] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 187.289292][ T7874] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 187.297818][ T7874] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 187.305854][ T7874] [ 187.311459][ T7874] loop2: detected capacity change from 0 to 512 [ 187.319240][ T7874] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 187.327969][ T7874] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 187.353040][ T7874] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xf0ffffff00000000, 0x0) 19:20:15 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000240), 0x78d, &(0x7f0000533000/0x2000)=nil, 0x5d8d5a476200a02d) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x226}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 86) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:15 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 187.728881][ T7896] FAULT_INJECTION: forcing a failure. [ 187.728881][ T7896] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 187.742552][ T7896] CPU: 0 PID: 7896 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 187.754119][ T7896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 187.764258][ T7896] Call Trace: [ 187.767570][ T7896] [ 187.770562][ T7896] dump_stack_lvl+0xda/0x130 [ 187.775309][ T7896] dump_stack+0x15/0x20 [ 187.779617][ T7896] should_fail_ex+0x21f/0x230 [ 187.785240][ T7896] __should_fail_alloc_page+0xfd/0x110 [ 187.790774][ T7896] __alloc_pages+0x108/0x340 [ 187.792564][ T7891] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 187.795407][ T7896] vma_alloc_folio+0x6a3/0x8c0 [ 187.795476][ T7896] ? shmem_inode_acct_block+0x1f5/0x220 [ 187.795513][ T7896] shmem_get_folio_gfp+0x579/0xc30 [ 187.795554][ T7896] shmem_write_begin+0xa6/0x210 [ 187.827355][ T7896] generic_perform_write+0x1c9/0x410 [ 187.832978][ T7896] ? shmem_write_begin+0x210/0x210 [ 187.838177][ T7896] shmem_file_write_iter+0xc8/0xe0 [ 187.843417][ T7896] vfs_write+0x4ab/0x7d0 [ 187.847687][ T7896] ksys_write+0xeb/0x1a0 [ 187.852614][ T7896] __x64_sys_write+0x42/0x50 [ 187.857306][ T7896] do_syscall_64+0x41/0xc0 [ 187.862016][ T7896] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 187.868171][ T7896] RIP: 0033:0x7ffa16ca582f [ 187.872628][ T7896] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 187.892654][ T7896] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 187.901169][ T7896] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 187.909356][ T7896] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 187.917608][ T7896] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 187.925663][ T7896] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 187.935738][ T7896] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 187.943727][ T7896] 19:20:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x20000000, 0x0) 19:20:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x300}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:16 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 87) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:16 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 188.019603][ T7903] FAULT_INJECTION: forcing a failure. [ 188.019603][ T7903] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 188.034098][ T7903] CPU: 0 PID: 7903 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 188.044517][ T7903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 188.054618][ T7903] Call Trace: [ 188.057977][ T7903] [ 188.060985][ T7903] dump_stack_lvl+0xda/0x130 [ 188.065766][ T7903] dump_stack+0x15/0x20 19:20:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x500}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x600}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 188.070142][ T7903] should_fail_ex+0x21f/0x230 [ 188.074849][ T7903] should_fail+0xb/0x10 [ 188.079065][ T7903] should_fail_usercopy+0x1a/0x20 [ 188.084155][ T7903] copy_page_from_iter_atomic+0x21c/0xcf0 [ 188.090057][ T7903] ? shmem_write_begin+0xa6/0x210 [ 188.095170][ T7903] ? shmem_write_begin+0x16d/0x210 [ 188.100353][ T7903] generic_perform_write+0x20c/0x410 [ 188.105777][ T7903] ? shmem_write_begin+0x210/0x210 [ 188.110955][ T7903] shmem_file_write_iter+0xc8/0xe0 [ 188.117000][ T7903] vfs_write+0x4ab/0x7d0 [ 188.121427][ T7903] ksys_write+0xeb/0x1a0 [ 188.125766][ T7903] __x64_sys_write+0x42/0x50 [ 188.130407][ T7903] do_syscall_64+0x41/0xc0 [ 188.134878][ T7903] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 188.141037][ T7903] RIP: 0033:0x7ffa16ca582f [ 188.145485][ T7903] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 188.166036][ T7903] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 188.176788][ T7903] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 188.184908][ T7903] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 188.193528][ T7903] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 188.201562][ T7903] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 188.209593][ T7903] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 188.217732][ T7903] [ 188.221845][ T7903] loop2: detected capacity change from 0 to 512 [ 188.230603][ T7903] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 188.239260][ T7903] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 188.264078][ T7903] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xf6ffffff00000000, 0x0) 19:20:16 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x700}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:16 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, &(0x7f0000000240), 0x78d, &(0x7f0000533000/0x2000)=nil, 0x5d8d5a476200a02d) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 88) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) [ 188.602016][ T7928] FAULT_INJECTION: forcing a failure. [ 188.602016][ T7928] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 188.615630][ T7928] CPU: 0 PID: 7928 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 188.626020][ T7928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 188.637164][ T7928] Call Trace: [ 188.640467][ T7928] [ 188.643452][ T7928] dump_stack_lvl+0xda/0x130 [ 188.648093][ T7928] dump_stack+0x15/0x20 [ 188.652451][ T7928] should_fail_ex+0x21f/0x230 [ 188.657362][ T7928] __should_fail_alloc_page+0xfd/0x110 [ 188.662941][ T7928] __alloc_pages+0x108/0x340 [ 188.667671][ T7928] vma_alloc_folio+0x6a3/0x8c0 [ 188.672518][ T7928] ? shmem_inode_acct_block+0x1f5/0x220 [ 188.673893][ T7925] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 188.678224][ T7928] shmem_get_folio_gfp+0x579/0xc30 [ 188.694717][ T7928] shmem_write_begin+0xa6/0x210 [ 188.699632][ T7928] generic_perform_write+0x1c9/0x410 [ 188.705085][ T7928] ? shmem_write_begin+0x210/0x210 [ 188.710386][ T7928] shmem_file_write_iter+0xc8/0xe0 [ 188.715569][ T7928] vfs_write+0x4ab/0x7d0 [ 188.719928][ T7928] ksys_write+0xeb/0x1a0 [ 188.724263][ T7928] __x64_sys_write+0x42/0x50 [ 188.728990][ T7928] do_syscall_64+0x41/0xc0 [ 188.733541][ T7928] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 188.739561][ T7928] RIP: 0033:0x7ffa16ca582f [ 188.744477][ T7928] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 188.764683][ T7928] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 188.773640][ T7928] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 188.782785][ T7928] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 188.790852][ T7928] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 188.798930][ T7928] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 188.806975][ T7928] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 188.815083][ T7928] 19:20:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x20100000, 0x0) 19:20:16 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x900}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$eJzs201vVFUfAPD/vdMC5eVp4cEXELWKRuJLSwsqCzcYTdiYmOgCl7UUggzU0JoIIVKNwaUhfgB1aeIncIUbo6w0bnVvTIhhI7owY+7MvWVoZ+pMp9OhzO+X3Pace0/vOf/ee2bOPWcmgL41mv1IIrZHxC8RMVzL3llgtPbr1s1L03/dvDSdRKXyxh9JtdyfNy9NF0U/Gxqq/t6Wn3MgItKPkyUnrJm7cPHMVLk8cz7Pj8+ffXd87sLF506fnTo1c2rm3OSRI4cPTbz4wuTzaxLnjqytez+Y3bfn2FtXX5s+fvXtH77OmrU9P14fR81Ix3WOxmij0Kue7Pjsd5frO2+nk4GGRa5tW7/m0KJS1PrpYLX/D0cpbl+84Xj1o542Dui2dPOyXaUisVAB7mHZaB7oR8Ubffb8W2zrOPbouRtHY3Ee41a+1Y4MRJo9w4/Uno12dKn+0Yg4vvD359kWDechAADW1rWjEfFso/FfGvfXlftfvjY0EhE7I2JXRPw/InZHxH0R1bIPRMSDbdY/uiS/fPzz09CqAmtRNv57KV/bunP8lxZFRkp5bkc1/sHk5OnyzMH8f3IgBjdn+YkV6vj2lZ8/bXasfvyXbVn9xVgwb8fvA0sm6E5MzU91EnO9Gx9G7B1oFH+yuBKQjY/3RMTeVZw/u3inn/5qX7Pj/x3/ChqvM7Wl8mXEU7XrvxBL4i8kK69Pjm+J8szB8eKuWO76j1deb1Z/R/Gvgez6b214/y/GP5LUr9fOtV/HlV8/afpMs9r7f1PyZjW9Kd/3/tT8/PmJiE3JwvL9k7f/tsgX5bP4D+xv3P93RfzzRf53D0VEdhM/HBGPRMSjedsfi4jHI2L/CvF///IT76w+/u7K4j/R1vVvP1E68903zepv7fofrqYO5Htaef1rtYGd/O8AAABgo0irn4FP0rHFdJqOjdU+w787tqbl2bn5Z07OvnfuRO2z8iMxmBYzXcN186ET+dxwkZ9ckj9UnTeuVCqVoWp+bHq23K01daA125r0/8xvpV63Dui6ltbRikWYZt9oAzakNVhHBzYo/R/6l/4P/Uv/h/7VqP9fjrjVg6YA68z7P/Qv/R/6l/4P/Uv/h77Uyff6V0rsOtatM99ridLd0Yy2E5HeFc1YXSJtdGhLRPSiPZsjotXCl9ethb1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgb/wYAAP//EUHlYw==") (fail_nth: 89) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) [ 188.892757][ T7936] FAULT_INJECTION: forcing a failure. [ 188.892757][ T7936] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 188.906012][ T7936] CPU: 1 PID: 7936 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 188.916935][ T7936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 188.927459][ T7936] Call Trace: [ 188.930848][ T7936] [ 188.933911][ T7936] dump_stack_lvl+0xda/0x130 [ 188.938559][ T7936] dump_stack+0x15/0x20 19:20:16 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0xf00}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x2602}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 188.942987][ T7936] should_fail_ex+0x21f/0x230 [ 188.947987][ T7936] should_fail+0xb/0x10 [ 188.952282][ T7936] should_fail_usercopy+0x1a/0x20 [ 188.957406][ T7936] copy_page_from_iter_atomic+0x21c/0xcf0 [ 188.963180][ T7936] ? shmem_write_begin+0xa6/0x210 [ 188.968350][ T7936] ? shmem_write_begin+0x16d/0x210 [ 188.973650][ T7936] generic_perform_write+0x20c/0x410 [ 188.979175][ T7936] ? shmem_write_begin+0x210/0x210 [ 188.985381][ T7936] shmem_file_write_iter+0xc8/0xe0 [ 188.990718][ T7936] vfs_write+0x4ab/0x7d0 [ 188.995106][ T7936] ksys_write+0xeb/0x1a0 [ 188.999464][ T7936] __x64_sys_write+0x42/0x50 [ 189.004197][ T7936] do_syscall_64+0x41/0xc0 [ 189.008854][ T7936] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 189.015656][ T7936] RIP: 0033:0x7ffa16ca582f [ 189.020171][ T7936] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 189.041549][ T7936] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 189.049973][ T7936] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 189.058159][ T7936] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 189.066227][ T7936] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 189.074243][ T7936] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 189.082621][ T7936] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 189.091590][ T7936] [ 189.096045][ T7936] loop2: detected capacity change from 0 to 512 [ 189.104684][ T7936] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 189.113661][ T7936] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 189.138613][ T7936] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xfeffffff00000000, 0x0) 19:20:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x3000}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:17 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:17 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x78d, &(0x7f0000533000/0x2000)=nil, 0x5d8d5a476200a02d) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 90) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) [ 189.458078][ T7956] FAULT_INJECTION: forcing a failure. [ 189.458078][ T7956] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 189.471608][ T7956] CPU: 1 PID: 7956 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 189.482063][ T7956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 189.492240][ T7956] Call Trace: [ 189.495551][ T7956] [ 189.498570][ T7956] dump_stack_lvl+0xda/0x130 [ 189.503250][ T7956] dump_stack+0x15/0x20 [ 189.507458][ T7956] should_fail_ex+0x21f/0x230 [ 189.512208][ T7956] __should_fail_alloc_page+0xfd/0x110 [ 189.517725][ T7956] __alloc_pages+0x108/0x340 [ 189.522403][ T7956] vma_alloc_folio+0x6a3/0x8c0 [ 189.527258][ T7956] ? shmem_inode_acct_block+0x1f5/0x220 [ 189.533021][ T7956] shmem_get_folio_gfp+0x579/0xc30 [ 189.538278][ T7956] shmem_write_begin+0xa6/0x210 [ 189.543300][ T7956] generic_perform_write+0x1c9/0x410 [ 189.545521][ T7957] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 189.548638][ T7956] ? shmem_write_begin+0x210/0x210 [ 189.564384][ T7956] shmem_file_write_iter+0xc8/0xe0 [ 189.569584][ T7956] vfs_write+0x4ab/0x7d0 [ 189.573919][ T7956] ksys_write+0xeb/0x1a0 [ 189.578266][ T7956] __x64_sys_write+0x42/0x50 [ 189.583068][ T7956] do_syscall_64+0x41/0xc0 [ 189.587556][ T7956] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 189.593620][ T7956] RIP: 0033:0x7ffa16ca582f [ 189.598186][ T7956] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 189.618456][ T7956] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 189.627325][ T7956] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 189.635536][ T7956] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 189.643606][ T7956] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 189.651815][ T7956] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 189.659933][ T7956] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 189.667915][ T7956] 19:20:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x3f000000, 0x0) 19:20:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x4400}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:17 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 91) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {0x1, 0x0, 0x6000}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:17 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x0, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) [ 189.755704][ T7965] FAULT_INJECTION: forcing a failure. [ 189.755704][ T7965] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 189.768989][ T7965] CPU: 1 PID: 7965 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 189.779793][ T7965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 189.789990][ T7965] Call Trace: [ 189.793329][ T7965] [ 189.796468][ T7965] dump_stack_lvl+0xda/0x130 [ 189.801100][ T7965] dump_stack+0x15/0x20 19:20:17 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x0, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 189.805372][ T7965] should_fail_ex+0x21f/0x230 [ 189.810440][ T7965] should_fail+0xb/0x10 [ 189.814644][ T7965] should_fail_usercopy+0x1a/0x20 [ 189.819856][ T7965] copy_page_from_iter_atomic+0x21c/0xcf0 [ 189.825762][ T7965] ? shmem_write_begin+0xa6/0x210 [ 189.830975][ T7965] ? shmem_write_begin+0x16d/0x210 [ 189.836247][ T7965] generic_perform_write+0x20c/0x410 [ 189.841584][ T7965] ? shmem_write_begin+0x210/0x210 [ 189.846854][ T7965] shmem_file_write_iter+0xc8/0xe0 [ 189.852381][ T7965] vfs_write+0x4ab/0x7d0 [ 189.856672][ T7965] ksys_write+0xeb/0x1a0 [ 189.861137][ T7965] __x64_sys_write+0x42/0x50 [ 189.866015][ T7965] do_syscall_64+0x41/0xc0 [ 189.870476][ T7965] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 189.876590][ T7965] RIP: 0033:0x7ffa16ca582f [ 189.881177][ T7965] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 189.901082][ T7965] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 189.909886][ T7965] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 189.917934][ T7965] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 189.926027][ T7965] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 189.934067][ T7965] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 189.942177][ T7965] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 189.951157][ T7965] [ 189.959376][ T7965] loop2: detected capacity change from 0 to 512 [ 189.970056][ T7965] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 189.980328][ T7965] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 190.006213][ T7965] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:18 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x0, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x2, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:18 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x5d8d5a476200a02d) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x40000000, 0x0) 19:20:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 92) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xff03000000000000, 0x0) 19:20:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x3, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 190.325370][ T7988] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 190.331070][ T7990] FAULT_INJECTION: forcing a failure. [ 190.331070][ T7990] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 190.349184][ T7990] CPU: 1 PID: 7990 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 190.360491][ T7990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 190.370677][ T7990] Call Trace: [ 190.373994][ T7990] [ 190.377151][ T7990] dump_stack_lvl+0xda/0x130 [ 190.381784][ T7990] dump_stack+0x15/0x20 [ 190.386042][ T7990] should_fail_ex+0x21f/0x230 [ 190.391381][ T7990] __should_fail_alloc_page+0xfd/0x110 [ 190.394371][ T7994] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 190.396961][ T7990] __alloc_pages+0x108/0x340 [ 190.411127][ T7990] vma_alloc_folio+0x6a3/0x8c0 [ 190.415961][ T7990] ? shmem_inode_acct_block+0x1f5/0x220 19:20:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x4, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:18 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x0, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 190.421566][ T7990] shmem_get_folio_gfp+0x579/0xc30 [ 190.426804][ T7990] shmem_write_begin+0xa6/0x210 [ 190.431789][ T7990] generic_perform_write+0x1c9/0x410 [ 190.437301][ T7990] ? shmem_write_begin+0x210/0x210 [ 190.437352][ T7996] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 190.452991][ T7990] shmem_file_write_iter+0xc8/0xe0 [ 190.458156][ T7990] vfs_write+0x4ab/0x7d0 [ 190.462416][ T7990] ksys_write+0xeb/0x1a0 [ 190.466689][ T7990] __x64_sys_write+0x42/0x50 [ 190.471394][ T7990] do_syscall_64+0x41/0xc0 [ 190.476042][ T7990] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 190.482056][ T7990] RIP: 0033:0x7ffa16ca582f [ 190.487016][ T7990] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 190.507207][ T7990] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 190.515802][ T7990] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f 19:20:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 93) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) [ 190.523892][ T7990] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 190.531950][ T7990] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 190.539988][ T7990] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 190.548196][ T7990] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 190.556836][ T7990] 19:20:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x7, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 190.597353][ T8000] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 190.606034][ T8004] FAULT_INJECTION: forcing a failure. [ 190.606034][ T8004] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 190.619465][ T8004] CPU: 1 PID: 8004 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 190.629970][ T8004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 190.640227][ T8004] Call Trace: [ 190.643544][ T8004] 19:20:18 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x0, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:18 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x0, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 190.647306][ T8004] dump_stack_lvl+0xda/0x130 [ 190.651945][ T8004] dump_stack+0x15/0x20 [ 190.656166][ T8004] should_fail_ex+0x21f/0x230 [ 190.661143][ T8004] should_fail+0xb/0x10 [ 190.665342][ T8004] should_fail_usercopy+0x1a/0x20 [ 190.670447][ T8004] copy_page_from_iter_atomic+0x21c/0xcf0 [ 190.677071][ T8004] ? shmem_write_begin+0xa6/0x210 [ 190.682153][ T8004] ? shmem_write_begin+0x16d/0x210 [ 190.687421][ T8004] generic_perform_write+0x20c/0x410 19:20:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x10, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 190.693323][ T8004] ? shmem_write_begin+0x210/0x210 [ 190.698528][ T8004] shmem_file_write_iter+0xc8/0xe0 [ 190.698803][ T8009] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 190.703709][ T8004] vfs_write+0x4ab/0x7d0 [ 190.703743][ T8004] ksys_write+0xeb/0x1a0 [ 190.703779][ T8004] __x64_sys_write+0x42/0x50 [ 190.725301][ T8004] do_syscall_64+0x41/0xc0 [ 190.729759][ T8004] ? irqentry_exit+0x12/0x40 [ 190.734516][ T8004] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 190.738529][ T8013] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 190.740511][ T8004] RIP: 0033:0x7ffa16ca582f [ 190.748658][ T8013] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 190.753044][ T8004] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 190.782049][ T8004] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 190.790498][ T8004] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f 19:20:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x1c, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 190.798575][ T8004] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 190.806582][ T8004] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 190.814745][ T8004] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 190.822781][ T8004] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 190.830791][ T8004] [ 190.837266][ T8004] loop2: detected capacity change from 0 to 512 [ 190.845406][ T8004] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 190.851777][ T8015] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 190.855670][ T8004] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 190.888097][ T8004] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x51000000, 0x0) 19:20:19 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:19 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x0, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x25, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 94) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xffff1f0000000000, 0x0) 19:20:19 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x0, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 191.206269][ T8025] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 191.217890][ T8026] FAULT_INJECTION: forcing a failure. [ 191.217890][ T8026] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 191.231254][ T8026] CPU: 1 PID: 8026 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 191.241767][ T8026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 191.251969][ T8026] Call Trace: 19:20:19 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x0, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 191.255322][ T8026] [ 191.258285][ T8026] dump_stack_lvl+0xda/0x130 [ 191.263033][ T8026] dump_stack+0x15/0x20 [ 191.265675][ T8032] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 191.267214][ T8026] should_fail_ex+0x21f/0x230 [ 191.267248][ T8026] __should_fail_alloc_page+0xfd/0x110 [ 191.287871][ T8026] __alloc_pages+0x108/0x340 [ 191.292644][ T8026] vma_alloc_folio+0x6a3/0x8c0 [ 191.297516][ T8026] ? shmem_inode_acct_block+0x1f5/0x220 [ 191.303130][ T8026] shmem_get_folio_gfp+0x579/0xc30 [ 191.308335][ T8026] shmem_write_begin+0xa6/0x210 [ 191.313289][ T8026] generic_perform_write+0x1c9/0x410 [ 191.318728][ T8026] ? shmem_write_begin+0x210/0x210 [ 191.323936][ T8026] shmem_file_write_iter+0xc8/0xe0 [ 191.329199][ T8026] vfs_write+0x4ab/0x7d0 [ 191.333484][ T8026] ksys_write+0xeb/0x1a0 [ 191.337851][ T8026] __x64_sys_write+0x42/0x50 [ 191.342563][ T8026] do_syscall_64+0x41/0xc0 [ 191.347028][ T8026] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 191.352950][ T8026] RIP: 0033:0x7ffa16ca582f [ 191.357451][ T8026] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 191.377583][ T8026] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 191.386011][ T8026] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 191.394000][ T8026] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 19:20:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 95) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) [ 191.401996][ T8026] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 191.409978][ T8026] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 191.417960][ T8026] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 191.425948][ T8026] [ 191.459089][ T8039] FAULT_INJECTION: forcing a failure. [ 191.459089][ T8039] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 191.472301][ T8039] CPU: 1 PID: 8039 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 191.478362][ T8042] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 191.482679][ T8039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 191.482699][ T8039] Call Trace: [ 191.482708][ T8039] 19:20:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x3, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:19 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r11, 0x200, 0x70bd29, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 191.482717][ T8039] dump_stack_lvl+0xda/0x130 [ 191.511969][ T8039] dump_stack+0x15/0x20 [ 191.516167][ T8039] should_fail_ex+0x21f/0x230 [ 191.520916][ T8039] should_fail+0xb/0x10 [ 191.525156][ T8039] should_fail_usercopy+0x1a/0x20 [ 191.530227][ T8039] copy_page_from_iter_atomic+0x21c/0xcf0 [ 191.536092][ T8039] ? shmem_write_begin+0xa6/0x210 [ 191.536475][ T8045] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 191.541265][ T8039] ? shmem_write_begin+0x16d/0x210 [ 191.541307][ T8039] generic_perform_write+0x20c/0x410 [ 191.560181][ T8039] ? shmem_write_begin+0x210/0x210 [ 191.565392][ T8039] shmem_file_write_iter+0xc8/0xe0 [ 191.570595][ T8039] vfs_write+0x4ab/0x7d0 [ 191.574932][ T8039] ksys_write+0xeb/0x1a0 [ 191.579224][ T8039] __x64_sys_write+0x42/0x50 [ 191.583915][ T8039] do_syscall_64+0x41/0xc0 [ 191.588418][ T8039] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 191.594384][ T8039] RIP: 0033:0x7ffa16ca582f [ 191.598898][ T8039] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 191.618687][ T8039] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 191.627216][ T8039] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 191.635235][ T8039] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 191.643247][ T8039] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 191.651338][ T8039] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 191.659424][ T8039] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 191.667476][ T8039] [ 191.672081][ T8039] loop2: detected capacity change from 0 to 512 [ 191.680452][ T8039] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 191.689389][ T8039] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 191.715678][ T8039] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x8cffffff, 0x0) 19:20:20 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 96) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x4, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:20 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r11, 0x200, 0x70bd29, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 192.040250][ T8057] FAULT_INJECTION: forcing a failure. [ 192.040250][ T8057] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 192.053589][ T8057] CPU: 0 PID: 8057 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 192.063954][ T8057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 192.074099][ T8057] Call Trace: [ 192.077457][ T8057] [ 192.080411][ T8057] dump_stack_lvl+0xda/0x130 [ 192.085156][ T8057] dump_stack+0x15/0x20 [ 192.089377][ T8057] should_fail_ex+0x21f/0x230 [ 192.094096][ T8057] __should_fail_alloc_page+0xfd/0x110 [ 192.099771][ T8057] __alloc_pages+0x108/0x340 [ 192.104497][ T8057] vma_alloc_folio+0x6a3/0x8c0 [ 192.109388][ T8057] ? shmem_inode_acct_block+0x1f5/0x220 [ 192.115031][ T8057] shmem_get_folio_gfp+0x579/0xc30 [ 192.120291][ T8057] shmem_write_begin+0xa6/0x210 [ 192.125248][ T8057] generic_perform_write+0x1c9/0x410 [ 192.130635][ T8057] ? shmem_write_begin+0x210/0x210 19:20:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xffffff7f00000000, 0x0) 19:20:20 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r11, 0x200, 0x70bd29, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:20 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x20, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x6]}]}, 0x20}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x7, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 192.135879][ T8057] shmem_file_write_iter+0xc8/0xe0 [ 192.141283][ T8057] vfs_write+0x4ab/0x7d0 [ 192.145578][ T8057] ksys_write+0xeb/0x1a0 [ 192.149878][ T8057] __x64_sys_write+0x42/0x50 [ 192.152850][ T8066] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 192.154611][ T8057] do_syscall_64+0x41/0xc0 [ 192.154643][ T8057] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 192.154685][ T8057] RIP: 0033:0x7ffa16ca582f [ 192.154701][ T8057] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 192.199543][ T8057] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 192.208075][ T8057] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 192.216096][ T8057] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 192.224110][ T8057] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 192.232229][ T8057] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 19:20:20 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x20, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x6]}]}, 0x20}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x10, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:20 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x20, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x6]}]}, 0x20}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 192.240485][ T8057] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 192.248574][ T8057] 19:20:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x1c, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 97) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:20 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xc0ed0000, 0x0) 19:20:20 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x0]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 192.894158][ T8081] FAULT_INJECTION: forcing a failure. [ 192.894158][ T8081] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 192.907319][ T8081] CPU: 0 PID: 8081 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 192.917752][ T8081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 192.927841][ T8081] Call Trace: [ 192.931156][ T8081] [ 192.934115][ T8081] dump_stack_lvl+0xda/0x130 [ 192.938748][ T8081] dump_stack+0x15/0x20 [ 192.942927][ T8081] should_fail_ex+0x21f/0x230 [ 192.947881][ T8081] should_fail+0xb/0x10 [ 192.952083][ T8081] should_fail_usercopy+0x1a/0x20 [ 192.957223][ T8081] copy_page_from_iter_atomic+0x21c/0xcf0 [ 192.963004][ T8081] ? shmem_write_begin+0xa6/0x210 [ 192.968118][ T8081] ? shmem_write_begin+0x16d/0x210 [ 192.973357][ T8081] generic_perform_write+0x20c/0x410 [ 192.978687][ T8081] ? shmem_write_begin+0x210/0x210 [ 192.983891][ T8081] shmem_file_write_iter+0xc8/0xe0 [ 192.989084][ T8081] vfs_write+0x4ab/0x7d0 [ 192.993371][ T8081] ksys_write+0xeb/0x1a0 [ 192.997657][ T8081] __x64_sys_write+0x42/0x50 [ 192.999255][ T8083] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 193.002308][ T8081] do_syscall_64+0x41/0xc0 [ 193.017285][ T8081] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 193.023231][ T8081] RIP: 0033:0x7ffa16ca582f 19:20:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xffffffff00000000, 0x0) 19:20:21 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x0]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x25, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 193.027794][ T8081] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 193.048605][ T8081] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 193.057061][ T8081] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 193.065073][ T8081] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 193.073103][ T8081] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 193.081110][ T8081] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 19:20:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 193.089194][ T8081] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 193.097245][ T8081] [ 193.112818][ T8081] loop2: detected capacity change from 0 to 512 [ 193.129788][ T8081] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled 19:20:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:21 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x0]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:21 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x20, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x8]}]}, 0x20}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) [ 193.153444][ T8081] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 193.184747][ T8081] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 98) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) [ 193.265185][ T8112] FAULT_INJECTION: forcing a failure. [ 193.265185][ T8112] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 193.278603][ T8112] CPU: 1 PID: 8112 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 193.289110][ T8112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 193.299235][ T8112] Call Trace: [ 193.302600][ T8112] [ 193.305538][ T8112] dump_stack_lvl+0xda/0x130 [ 193.310252][ T8112] dump_stack+0x15/0x20 [ 193.314513][ T8112] should_fail_ex+0x21f/0x230 [ 193.319230][ T8112] __should_fail_alloc_page+0xfd/0x110 [ 193.324907][ T8112] __alloc_pages+0x108/0x340 [ 193.329523][ T8112] vma_alloc_folio+0x6a3/0x8c0 [ 193.334362][ T8112] ? shmem_inode_acct_block+0x1f5/0x220 [ 193.340047][ T8112] shmem_get_folio_gfp+0x579/0xc30 [ 193.345246][ T8112] shmem_write_begin+0xa6/0x210 [ 193.350143][ T8112] generic_perform_write+0x1c9/0x410 [ 193.355450][ T8112] ? shmem_write_begin+0x210/0x210 [ 193.360675][ T8112] shmem_file_write_iter+0xc8/0xe0 [ 193.365822][ T8112] vfs_write+0x4ab/0x7d0 [ 193.370087][ T8112] ksys_write+0xeb/0x1a0 [ 193.374456][ T8112] __x64_sys_write+0x42/0x50 [ 193.379094][ T8112] do_syscall_64+0x41/0xc0 [ 193.383549][ T8112] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 193.389500][ T8112] RIP: 0033:0x7ffa16ca582f [ 193.393970][ T8112] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 193.413714][ T8112] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 193.422159][ T8112] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 193.430143][ T8112] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 193.438151][ T8112] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 193.446138][ T8112] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 193.454129][ T8112] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 193.462151][ T8112] 19:20:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xf0ffffff, 0x0) 19:20:21 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x20, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x8]}]}, 0x20}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7472d10300216ce7c98992e720616e7f3f0579047a0dcb2fb16ca2b05a197f323acffbac94bb2df5af7f1b9c78c5365425fdd45923181a61884705950988da6a2e15725342e5495768fd863a9d6e6908d25c152c60d48da26c", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) 19:20:21 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x6}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") (fail_nth: 99) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:21 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x20, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x8]}]}, 0x20}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x8}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 193.940224][ T8126] FAULT_INJECTION: forcing a failure. [ 193.940224][ T8126] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 193.953417][ T8126] CPU: 0 PID: 8126 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 193.963917][ T8126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 193.974027][ T8126] Call Trace: [ 193.977371][ T8126] [ 193.980325][ T8126] dump_stack_lvl+0xda/0x130 [ 193.984960][ T8126] dump_stack+0x15/0x20 [ 193.989166][ T8126] should_fail_ex+0x21f/0x230 [ 193.993904][ T8126] should_fail+0xb/0x10 [ 193.998191][ T8126] should_fail_usercopy+0x1a/0x20 [ 194.003258][ T8126] copy_page_from_iter_atomic+0x21c/0xcf0 [ 194.003637][ T8125] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 194.009095][ T8126] ? shmem_write_begin+0xa6/0x210 [ 194.024607][ T8126] ? shmem_write_begin+0x16d/0x210 [ 194.029814][ T8126] generic_perform_write+0x20c/0x410 [ 194.035152][ T8126] ? shmem_write_begin+0x210/0x210 19:20:22 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x0, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7472d10300216ce7c98992e720616e7f3f0579047a0dcb2fb16ca2b05a197f323acffbac94bb2df5af7f1b9c78c5365425fdd45923181a61884705950988da6a2e15725342e5495768fd863a9d6e6908d25c152c60d48da26c", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) [ 194.040342][ T8126] shmem_file_write_iter+0xc8/0xe0 [ 194.045582][ T8126] vfs_write+0x4ab/0x7d0 [ 194.049884][ T8126] ksys_write+0xeb/0x1a0 [ 194.054253][ T8126] __x64_sys_write+0x42/0x50 [ 194.058878][ T8126] do_syscall_64+0x41/0xc0 [ 194.063381][ T8126] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 194.069343][ T8126] RIP: 0033:0x7ffa16ca582f 19:20:22 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x0, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x9}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 194.073844][ T8126] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 194.093576][ T8126] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 194.102155][ T8126] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 194.110169][ T8126] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 194.118176][ T8126] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 194.126195][ T8126] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 [ 194.134272][ T8126] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 194.142312][ T8126] [ 194.148210][ T8126] loop2: detected capacity change from 0 to 512 [ 194.157432][ T8126] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 194.166681][ T8126] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 194.193970][ T8126] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$eJzs201vVFUfAPD/vdMC5eVp4cEXELWKRuJLSwsqCzcYTdiYmOgCl7UUggzU0JoIIVKNwaUhfgB1aeIncIUbo6w0bnVvTIhhI7owY+7MvWVoZ+pMp9OhzO+X3Pace0/vOf/ee2bOPWcmgL41mv1IIrZHxC8RMVzL3llgtPbr1s1L03/dvDSdRKXyxh9JtdyfNy9NF0U/Gxqq/t6Wn3MgItKPkyUnrJm7cPHMVLk8cz7Pj8+ffXd87sLF506fnTo1c2rm3OSRI4cPTbz4wuTzaxLnjqytez+Y3bfn2FtXX5s+fvXtH77OmrU9P14fR81Ix3WOxmij0Kue7Pjsd5frO2+nk4GGRa5tW7/m0KJS1PrpYLX/D0cpbl+84Xj1o542Dui2dPOyXaUisVAB7mHZaB7oR8Ubffb8W2zrOPbouRtHY3Ee41a+1Y4MRJo9w4/Uno12dKn+0Yg4vvD359kWDechAADW1rWjEfFso/FfGvfXlftfvjY0EhE7I2JXRPw/InZHxH0R1bIPRMSDbdY/uiS/fPzz09CqAmtRNv57KV/bunP8lxZFRkp5bkc1/sHk5OnyzMH8f3IgBjdn+YkV6vj2lZ8/bXasfvyXbVn9xVgwb8fvA0sm6E5MzU91EnO9Gx9G7B1oFH+yuBKQjY/3RMTeVZw/u3inn/5qX7Pj/x3/ChqvM7Wl8mXEU7XrvxBL4i8kK69Pjm+J8szB8eKuWO76j1deb1Z/R/Gvgez6b214/y/GP5LUr9fOtV/HlV8/afpMs9r7f1PyZjW9Kd/3/tT8/PmJiE3JwvL9k7f/tsgX5bP4D+xv3P93RfzzRf53D0VEdhM/HBGPRMSjedsfi4jHI2L/CvF///IT76w+/u7K4j/R1vVvP1E68903zepv7fofrqYO5Htaef1rtYGd/O8AAABgo0irn4FP0rHFdJqOjdU+w787tqbl2bn5Z07OvnfuRO2z8iMxmBYzXcN186ET+dxwkZ9ckj9UnTeuVCqVoWp+bHq23K01daA125r0/8xvpV63Dui6ltbRikWYZt9oAzakNVhHBzYo/R/6l/4P/Uv/h/7VqP9fjrjVg6YA68z7P/Qv/R/6l/4P/Uv/h77Uyff6V0rsOtatM99ridLd0Yy2E5HeFc1YXSJtdGhLRPSiPZsjotXCl9ethb1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgb/wYAAP//EUHlYw==") (fail_nth: 100) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:22 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xf6ffffff, 0x0) 19:20:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0xa}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:22 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x0, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7472d10300216ce7c98992e720616e7f3f0579047a0dcb2fb16ca2b05a197f323acffbac94bb2df5af7f1b9c78c5365425fdd45923181a61884705950988da6a2e15725342e5495768fd863a9d6e6908d25c152c60d48da26c", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) 19:20:22 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x20, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x6, 0x8]}]}, 0x20}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0xb}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:22 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x20, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x6, 0x8]}]}, 0x20}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) [ 194.626915][ T8146] FAULT_INJECTION: forcing a failure. [ 194.626915][ T8146] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 194.640323][ T8146] CPU: 0 PID: 8146 Comm: syz-executor.2 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 194.650696][ T8146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 194.660840][ T8146] Call Trace: [ 194.664150][ T8146] [ 194.667103][ T8146] dump_stack_lvl+0xda/0x130 [ 194.671762][ T8146] dump_stack+0x15/0x20 [ 194.676021][ T8146] should_fail_ex+0x21f/0x230 [ 194.680757][ T8146] __should_fail_alloc_page+0xfd/0x110 [ 194.686336][ T8146] __alloc_pages+0x108/0x340 [ 194.691049][ T8146] vma_alloc_folio+0x6a3/0x8c0 [ 194.695920][ T8146] ? shmem_inode_acct_block+0x1f5/0x220 [ 194.701574][ T8146] shmem_get_folio_gfp+0x579/0xc30 [ 194.706966][ T8146] shmem_write_begin+0xa6/0x210 [ 194.711885][ T8146] generic_perform_write+0x1c9/0x410 [ 194.717220][ T8146] ? shmem_write_begin+0x210/0x210 19:20:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x10}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfd14) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x1, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) [ 194.722394][ T8146] shmem_file_write_iter+0xc8/0xe0 [ 194.727903][ T8146] vfs_write+0x4ab/0x7d0 [ 194.732193][ T8146] ksys_write+0xeb/0x1a0 [ 194.734128][ T8151] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 194.736484][ T8146] __x64_sys_write+0x42/0x50 [ 194.736518][ T8146] do_syscall_64+0x41/0xc0 [ 194.755996][ T8146] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 194.761953][ T8146] RIP: 0033:0x7ffa16ca582f 19:20:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x11}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 194.766428][ T8146] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 194.786136][ T8146] RSP: 002b:00007ffa16028e70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 194.794663][ T8146] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007ffa16ca582f [ 194.802875][ T8146] RDX: 0000000000040000 RSI: 00007ffa0dc09000 RDI: 0000000000000004 [ 194.810911][ T8146] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045a [ 194.819025][ T8146] R10: 00000000000003be R11: 0000000000000293 R12: 0000000000000004 19:20:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010000, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) [ 194.827310][ T8146] R13: 00007ffa16028f3c R14: 00007ffa16028f40 R15: 00007ffa0dc09000 [ 194.835336][ T8146] [ 194.878164][ T8172] loop2: detected capacity change from 0 to 512 [ 194.885993][ T8172] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 194.894960][ T8172] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 194.920678][ T8172] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:23 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) [ 195.061831][ T8176] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) 19:20:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xfeffffff, 0x0) 19:20:23 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x20, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x6, 0x8]}]}, 0x20}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') creat(&(0x7f00000000c0)='./bus\x00', 0x0) (async) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfd14) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x1, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) 19:20:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x13}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010002, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:23 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:23 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x0, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfd14) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x1, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') (async) creat(&(0x7f00000000c0)='./bus\x00', 0x0) (async) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfd14) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x1, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) (async) [ 195.492166][ T8185] loop2: detected capacity change from 0 to 512 [ 195.508653][ T8185] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled 19:20:23 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x0, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x14}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 195.534531][ T8193] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 195.541282][ T8185] EXT4-fs (loop2): external journal device major/minor numbers have changed 19:20:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xc) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x48800, 0x128) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@uid_lt}]}}) unlinkat(r1, &(0x7f00000001c0)='./bus\x00', 0x200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./bus\x00', 0x40) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1d}}, './file0\x00'}) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) [ 195.607437][ T8185] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 [ 195.617328][ T8187] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) 19:20:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xff030000, 0x0) 19:20:24 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x0, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4, 0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010003, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xc) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x48800, 0x128) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@uid_lt}]}}) (async) unlinkat(r1, &(0x7f00000001c0)='./bus\x00', 0x200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) (async) r2 = creat(&(0x7f0000000280)='./bus\x00', 0x40) (async) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1d}}, './file0\x00'}) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)) (async) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) 19:20:24 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, 0x0, 0x0) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4, 0x14}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:24 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xc) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x48800, 0x128) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@uid_lt}]}}) unlinkat(r1, &(0x7f00000001c0)='./bus\x00', 0x200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./bus\x00', 0x40) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1d}}, './file0\x00'}) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xc) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') (async) openat(r0, &(0x7f0000000100)='./file0\x00', 0x48800, 0x128) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@uid_lt}]}}) (async) unlinkat(r1, &(0x7f00000001c0)='./bus\x00', 0x200) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) (async) creat(&(0x7f0000000280)='./bus\x00', 0x40) (async) creat(&(0x7f0000000100)='./bus\x00', 0x0) (async) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1d}}, './file0\x00'}) (async) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)) (async) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) (async) [ 196.348421][ T8219] loop2: detected capacity change from 0 to 512 [ 196.369429][ T8219] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled 19:20:24 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 196.391144][ T8219] EXT4-fs (loop2): external journal device major/minor numbers have changed 19:20:24 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 196.448222][ T8219] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 [ 196.458736][ T8221] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 196.470655][ T8236] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 19:20:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) r1 = getegid() mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x94c0e2, &(0x7f0000000200)={[{@gid={'gid', 0x3d, r1}}, {@nr_inodes={'nr_inodes', 0x3d, [0x67, 0x74, 0x6d, 0x74, 0x33, 0x32, 0x31]}}]}) setsockopt$MRT_DEL_MFC_PROXY(0xffffffffffffffff, 0x0, 0xd3, &(0x7f00000001c0)={@broadcast, @multicast2, 0x1, "c25a3412985f13312fe10fa6185ee92c328f256cd490d91b7c93a38edf814398", 0x4, 0x9, 0x7e2, 0xffffff8b}, 0x3c) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) 19:20:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010004, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:25 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xffff1f00, 0x0) 19:20:25 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, 0x0, 0x0) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:25 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 197.211753][ T8256] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 197.214905][ T8255] loop2: detected capacity change from 0 to 512 [ 197.231430][ T8255] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 197.251404][ T8255] EXT4-fs (loop2): external journal device major/minor numbers have changed 19:20:25 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) r1 = getegid() mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x94c0e2, &(0x7f0000000200)={[{@gid={'gid', 0x3d, r1}}, {@nr_inodes={'nr_inodes', 0x3d, [0x67, 0x74, 0x6d, 0x74, 0x33, 0x32, 0x31]}}]}) (async) setsockopt$MRT_DEL_MFC_PROXY(0xffffffffffffffff, 0x0, 0xd3, &(0x7f00000001c0)={@broadcast, @multicast2, 0x1, "c25a3412985f13312fe10fa6185ee92c328f256cd490d91b7c93a38edf814398", 0x4, 0x9, 0x7e2, 0xffffff8b}, 0x3c) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) 19:20:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x7}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 197.284943][ T8264] netlink: 'syz-executor.3': attribute type 6 has an invalid length. [ 197.316143][ T8267] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 197.319961][ T8255] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:25 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x10}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010005, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$eJzs201vVFUfAPD/vdMC5eVp4cEXELWKRuJLSwsqCzcYTdiYmOgCl7UUggzU0JoIIVKNwaUhfgB1aeIncIUbo6w0bnVvTIhhI7owY+7MvWVoZ+pMp9OhzO+X3Pace0/vOf/ee2bOPWcmgL41mv1IIrZHxC8RMVzL3llgtPbr1s1L03/dvDSdRKXyxh9JtdyfNy9NF0U/Gxqq/t6Wn3MgItKPkyUnrJm7cPHMVLk8cz7Pj8+ffXd87sLF506fnTo1c2rm3OSRI4cPTbz4wuTzaxLnjqytez+Y3bfn2FtXX5s+fvXtH77OmrU9P14fR81Ix3WOxmij0Kue7Pjsd5frO2+nk4GGRa5tW7/m0KJS1PrpYLX/D0cpbl+84Xj1o542Dui2dPOyXaUisVAB7mHZaB7oR8Ubffb8W2zrOPbouRtHY3Ee41a+1Y4MRJo9w4/Uno12dKn+0Yg4vvD359kWDechAADW1rWjEfFso/FfGvfXlftfvjY0EhE7I2JXRPw/InZHxH0R1bIPRMSDbdY/uiS/fPzz09CqAmtRNv57KV/bunP8lxZFRkp5bkc1/sHk5OnyzMH8f3IgBjdn+YkV6vj2lZ8/bXasfvyXbVn9xVgwb8fvA0sm6E5MzU91EnO9Gx9G7B1oFH+yuBKQjY/3RMTeVZw/u3inn/5qX7Pj/x3/ChqvM7Wl8mXEU7XrvxBL4i8kK69Pjm+J8szB8eKuWO76j1deb1Z/R/Gvgez6b214/y/GP5LUr9fOtV/HlV8/afpMs9r7f1PyZjW9Kd/3/tT8/PmJiE3JwvL9k7f/tsgX5bP4D+xv3P93RfzzRf53D0VEdhM/HBGPRMSjedsfi4jHI2L/CvF///IT76w+/u7K4j/R1vVvP1E68903zepv7fofrqYO5Htaef1rtYGd/O8AAABgo0irn4FP0rHFdJqOjdU+w787tqbl2bn5Z07OvnfuRO2z8iMxmBYzXcN186ET+dxwkZ9ckj9UnTeuVCqVoWp+bHq23K01daA125r0/8xvpV63Dui6ltbRikWYZt9oAzakNVhHBzYo/R/6l/4P/Uv/h/7VqP9fjrjVg6YA68z7P/Qv/R/6l/4P/Uv/h77Uyff6V0rsOtatM99ridLd0Yy2E5HeFc1YXSJtdGhLRPSiPZsjotXCl9ethb1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgb/wYAAP//EUHlYw==") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:25 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 197.369989][ T8274] netlink: 'syz-executor.3': attribute type 6 has an invalid length. 19:20:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async, rerun: 32) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') (rerun: 32) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) (async) r1 = getegid() mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x94c0e2, &(0x7f0000000200)={[{@gid={'gid', 0x3d, r1}}, {@nr_inodes={'nr_inodes', 0x3d, [0x67, 0x74, 0x6d, 0x74, 0x33, 0x32, 0x31]}}]}) (async) setsockopt$MRT_DEL_MFC_PROXY(0xffffffffffffffff, 0x0, 0xd3, &(0x7f00000001c0)={@broadcast, @multicast2, 0x1, "c25a3412985f13312fe10fa6185ee92c328f256cd490d91b7c93a38edf814398", 0x4, 0x9, 0x7e2, 0xffffff8b}, 0x3c) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) [ 197.427331][ T8280] netlink: 'syz-executor.3': attribute type 6 has an invalid length. [ 197.427451][ T8281] loop2: detected capacity change from 0 to 512 [ 197.461869][ T8281] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 197.478218][ T8281] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 197.506131][ T8281] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xffffff7f, 0x0) 19:20:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x1c}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:26 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010006, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$eJzs201vVFUfAPD/vdMC5eVp4cEXELWKRuJLSwsqCzcYTdiYmOgCl7UUggzU0JoIIVKNwaUhfgB1aeIncIUbo6w0bnVvTIhhI7owY+7MvWVoZ+pMp9OhzO+X3Pace0/vOf/ee2bOPWcmgL41mv1IIrZHxC8RMVzL3llgtPbr1s1L03/dvDSdRKXyxh9JtdyfNy9NF0U/Gxqq/t6Wn3MgItKPkyUnrJm7cPHMVLk8cz7Pj8+ffXd87sLF506fnTo1c2rm3OSRI4cPTbz4wuTzaxLnjqytez+Y3bfn2FtXX5s+fvXtH77OmrU9P14fR81Ix3WOxmij0Kue7Pjsd5frO2+nk4GGRa5tW7/m0KJS1PrpYLX/D0cpbl+84Xj1o542Dui2dPOyXaUisVAB7mHZaB7oR8Ubffb8W2zrOPbouRtHY3Ee41a+1Y4MRJo9w4/Uno12dKn+0Yg4vvD359kWDechAADW1rWjEfFso/FfGvfXlftfvjY0EhE7I2JXRPw/InZHxH0R1bIPRMSDbdY/uiS/fPzz09CqAmtRNv57KV/bunP8lxZFRkp5bkc1/sHk5OnyzMH8f3IgBjdn+YkV6vj2lZ8/bXasfvyXbVn9xVgwb8fvA0sm6E5MzU91EnO9Gx9G7B1oFH+yuBKQjY/3RMTeVZw/u3inn/5qX7Pj/x3/ChqvM7Wl8mXEU7XrvxBL4i8kK69Pjm+J8szB8eKuWO76j1deb1Z/R/Gvgez6b214/y/GP5LUr9fOtV/HlV8/afpMs9r7f1PyZjW9Kd/3/tT8/PmJiE3JwvL9k7f/tsgX5bP4D+xv3P93RfzzRf53D0VEdhM/HBGPRMSjedsfi4jHI2L/CvF///IT76w+/u7K4j/R1vVvP1E68903zepv7fofrqYO5Htaef1rtYGd/O8AAABgo0irn4FP0rHFdJqOjdU+w787tqbl2bn5Z07OvnfuRO2z8iMxmBYzXcN186ET+dxwkZ9ckj9UnTeuVCqVoWp+bHq23K01daA125r0/8xvpV63Dui6ltbRikWYZt9oAzakNVhHBzYo/R/6l/4P/Uv/h/7VqP9fjrjVg6YA68z7P/Qv/R/6l/4P/Uv/h77Uyff6V0rsOtatM99ridLd0Yy2E5HeFc1YXSJtdGhLRPSiPZsjotXCl9ethb1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgb/wYAAP//EUHlYw==") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) 19:20:26 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, 0x0, 0x0) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:26 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x25}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 198.063383][ T8297] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 198.075600][ T8298] loop2: detected capacity change from 0 to 512 [ 198.086025][ T8298] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 198.094900][ T8298] EXT4-fs (loop2): external journal device major/minor numbers have changed 19:20:26 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 198.133449][ T8308] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 198.156946][ T8298] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x7}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:26 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010007, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) [ 198.180260][ T8312] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 198.253039][ T8320] loop2: detected capacity change from 0 to 512 [ 198.261074][ T8320] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 198.271781][ T8320] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 198.298489][ T8320] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xffffff8c, 0x0) 19:20:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:26 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200), 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:26 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000), 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010008, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$eJzs201vVFUfAPD/vdMC5eVp4cEXELWKRuJLSwsqCzcYTdiYmOgCl7UUggzU0JoIIVKNwaUhfgB1aeIncIUbo6w0bnVvTIhhI7owY+7MvWVoZ+pMp9OhzO+X3Pace0/vOf/ee2bOPWcmgL41mv1IIrZHxC8RMVzL3llgtPbr1s1L03/dvDSdRKXyxh9JtdyfNy9NF0U/Gxqq/t6Wn3MgItKPkyUnrJm7cPHMVLk8cz7Pj8+ffXd87sLF506fnTo1c2rm3OSRI4cPTbz4wuTzaxLnjqytez+Y3bfn2FtXX5s+fvXtH77OmrU9P14fR81Ix3WOxmij0Kue7Pjsd5frO2+nk4GGRa5tW7/m0KJS1PrpYLX/D0cpbl+84Xj1o542Dui2dPOyXaUisVAB7mHZaB7oR8Ubffb8W2zrOPbouRtHY3Ee41a+1Y4MRJo9w4/Uno12dKn+0Yg4vvD359kWDechAADW1rWjEfFso/FfGvfXlftfvjY0EhE7I2JXRPw/InZHxH0R1bIPRMSDbdY/uiS/fPzz09CqAmtRNv57KV/bunP8lxZFRkp5bkc1/sHk5OnyzMH8f3IgBjdn+YkV6vj2lZ8/bXasfvyXbVn9xVgwb8fvA0sm6E5MzU91EnO9Gx9G7B1oFH+yuBKQjY/3RMTeVZw/u3inn/5qX7Pj/x3/ChqvM7Wl8mXEU7XrvxBL4i8kK69Pjm+J8szB8eKuWO76j1deb1Z/R/Gvgez6b214/y/GP5LUr9fOtV/HlV8/afpMs9r7f1PyZjW9Kd/3/tT8/PmJiE3JwvL9k7f/tsgX5bP4D+xv3P93RfzzRf53D0VEdhM/HBGPRMSjedsfi4jHI2L/CvF///IT76w+/u7K4j/R1vVvP1E68903zepv7fofrqYO5Htaef1rtYGd/O8AAABgo0irn4FP0rHFdJqOjdU+w787tqbl2bn5Z07OvnfuRO2z8iMxmBYzXcN186ET+dxwkZ9ckj9UnTeuVCqVoWp+bHq23K01daA125r0/8xvpV63Dui6ltbRikWYZt9oAzakNVhHBzYo/R/6l/4P/Uv/h/7VqP9fjrjVg6YA68z7P/Qv/R/6l/4P/Uv/h77Uyff6V0rsOtatM99ridLd0Yy2E5HeFc1YXSJtdGhLRPSiPZsjotXCl9ethb1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgb/wYAAP//EUHlYw==") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) 19:20:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:27 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200), 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 198.936751][ T8332] loop2: detected capacity change from 0 to 512 [ 198.953754][ T8332] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled 19:20:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 198.982995][ T8332] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 199.016958][ T8334] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 199.032629][ T8332] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010009, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:27 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200), 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 199.114577][ T8350] loop2: detected capacity change from 0 to 512 [ 199.131187][ T8350] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 199.147849][ T8350] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 199.177010][ T8350] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:27 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xfffffff0, 0x0) 19:20:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x201000a, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) 19:20:27 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000), 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x7}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:27 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 199.818487][ T8369] loop2: detected capacity change from 0 to 512 [ 199.842018][ T8369] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 199.857785][ T8369] EXT4-fs (loop2): external journal device major/minor numbers have changed 19:20:27 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 199.902092][ T8380] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 199.904909][ T8369] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x201000b, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$eJzs201vVFUfAPD/vdMC5eVp4cEXELWKRuJLSwsqCzcYTdiYmOgCl7UUggzU0JoIIVKNwaUhfgB1aeIncIUbo6w0bnVvTIhhI7owY+7MvWVoZ+pMp9OhzO+X3Pace0/vOf/ee2bOPWcmgL41mv1IIrZHxC8RMVzL3llgtPbr1s1L03/dvDSdRKXyxh9JtdyfNy9NF0U/Gxqq/t6Wn3MgItKPkyUnrJm7cPHMVLk8cz7Pj8+ffXd87sLF506fnTo1c2rm3OSRI4cPTbz4wuTzaxLnjqytez+Y3bfn2FtXX5s+fvXtH77OmrU9P14fR81Ix3WOxmij0Kue7Pjsd5frO2+nk4GGRa5tW7/m0KJS1PrpYLX/D0cpbl+84Xj1o542Dui2dPOyXaUisVAB7mHZaB7oR8Ubffb8W2zrOPbouRtHY3Ee41a+1Y4MRJo9w4/Uno12dKn+0Yg4vvD359kWDechAADW1rWjEfFso/FfGvfXlftfvjY0EhE7I2JXRPw/InZHxH0R1bIPRMSDbdY/uiS/fPzz09CqAmtRNv57KV/bunP8lxZFRkp5bkc1/sHk5OnyzMH8f3IgBjdn+YkV6vj2lZ8/bXasfvyXbVn9xVgwb8fvA0sm6E5MzU91EnO9Gx9G7B1oFH+yuBKQjY/3RMTeVZw/u3inn/5qX7Pj/x3/ChqvM7Wl8mXEU7XrvxBL4i8kK69Pjm+J8szB8eKuWO76j1deb1Z/R/Gvgez6b214/y/GP5LUr9fOtV/HlV8/afpMs9r7f1PyZjW9Kd/3/tT8/PmJiE3JwvL9k7f/tsgX5bP4D+xv3P93RfzzRf53D0VEdhM/HBGPRMSjedsfi4jHI2L/CvF///IT76w+/u7K4j/R1vVvP1E68903zepv7fofrqYO5Htaef1rtYGd/O8AAABgo0irn4FP0rHFdJqOjdU+w787tqbl2bn5Z07OvnfuRO2z8iMxmBYzXcN186ET+dxwkZ9ckj9UnTeuVCqVoWp+bHq23K01daA125r0/8xvpV63Dui6ltbRikWYZt9oAzakNVhHBzYo/R/6l/4P/Uv/h/7VqP9fjrjVg6YA68z7P/Qv/R/6l/4P/Uv/h77Uyff6V0rsOtatM99ridLd0Yy2E5HeFc1YXSJtdGhLRPSiPZsjotXCl9ethb1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgb/wYAAP//EUHlYw==") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:28 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 200.004646][ T8388] loop2: detected capacity change from 0 to 512 [ 200.022633][ T8388] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 200.035051][ T8388] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 200.061598][ T8388] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:28 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xf}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xfffffff6, 0x0) 19:20:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x201000c, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$eJzs201vVFUfAPD/vdMC5eVp4cEXELWKRuJLSwsqCzcYTdiYmOgCl7UUggzU0JoIIVKNwaUhfgB1aeIncIUbo6w0bnVvTIhhI7owY+7MvWVoZ+pMp9OhzO+X3Pace0/vOf/ee2bOPWcmgL41mv1IIrZHxC8RMVzL3llgtPbr1s1L03/dvDSdRKXyxh9JtdyfNy9NF0U/Gxqq/t6Wn3MgItKPkyUnrJm7cPHMVLk8cz7Pj8+ffXd87sLF506fnTo1c2rm3OSRI4cPTbz4wuTzaxLnjqytez+Y3bfn2FtXX5s+fvXtH77OmrU9P14fR81Ix3WOxmij0Kue7Pjsd5frO2+nk4GGRa5tW7/m0KJS1PrpYLX/D0cpbl+84Xj1o542Dui2dPOyXaUisVAB7mHZaB7oR8Ubffb8W2zrOPbouRtHY3Ee41a+1Y4MRJo9w4/Uno12dKn+0Yg4vvD359kWDechAADW1rWjEfFso/FfGvfXlftfvjY0EhE7I2JXRPw/InZHxH0R1bIPRMSDbdY/uiS/fPzz09CqAmtRNv57KV/bunP8lxZFRkp5bkc1/sHk5OnyzMH8f3IgBjdn+YkV6vj2lZ8/bXasfvyXbVn9xVgwb8fvA0sm6E5MzU91EnO9Gx9G7B1oFH+yuBKQjY/3RMTeVZw/u3inn/5qX7Pj/x3/ChqvM7Wl8mXEU7XrvxBL4i8kK69Pjm+J8szB8eKuWO76j1deb1Z/R/Gvgez6b214/y/GP5LUr9fOtV/HlV8/afpMs9r7f1PyZjW9Kd/3/tT8/PmJiE3JwvL9k7f/tsgX5bP4D+xv3P93RfzzRf53D0VEdhM/HBGPRMSjedsfi4jHI2L/CvF///IT76w+/u7K4j/R1vVvP1E68903zepv7fofrqYO5Htaef1rtYGd/O8AAABgo0irn4FP0rHFdJqOjdU+w787tqbl2bn5Z07OvnfuRO2z8iMxmBYzXcN186ET+dxwkZ9ckj9UnTeuVCqVoWp+bHq23K01daA125r0/8xvpV63Dui6ltbRikWYZt9oAzakNVhHBzYo/R/6l/4P/Uv/h/7VqP9fjrjVg6YA68z7P/Qv/R/6l/4P/Uv/h77Uyff6V0rsOtatM99ridLd0Yy2E5HeFc1YXSJtdGhLRPSiPZsjotXCl9ethb1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgb/wYAAP//EUHlYw==") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:28 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000), 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x1000, &(0x7f0000000180)=ANY=[@ANYBLOB="74ff616e733d66642c7266646e6f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',cache=fscache,cache=fscache,\x00']) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) 19:20:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x1000, &(0x7f0000000180)=ANY=[@ANYBLOB="74ff616e733d66642c7266646e6f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',cache=fscache,cache=fscache,\x00']) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) 19:20:28 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x30}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 200.694412][ T8401] loop2: detected capacity change from 0 to 512 [ 200.721347][ T8401] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled 19:20:28 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x1000, &(0x7f0000000180)=ANY=[@ANYBLOB="74ff616e733d66642c7266646e6f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',cache=fscache,cache=fscache,\x00']) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) 19:20:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x44}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:28 executing program 0: mkdirat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7460616e731f66642c7246646e6f3d1ce5e91824911a21895d34e01b4620b0957cb75ba874ff860907f1f5b7bbb84a3aa8c481cc5f5a1ab03f58af95d59d6a0d5cd4697e7c1c0200000000000018d41ae5c723431c4d4751a988dad9fd35839ef7c34386b3c32c97de67590a2434168731ba140988b46f5bf3364b9a904ee93c30f1c0a0", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) [ 200.743124][ T8401] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 200.775434][ T8401] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x60}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}}, 0x0) [ 200.812309][ T8400] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) 19:20:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x201000d, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xfffffffe, 0x0) 19:20:29 executing program 0: mkdirat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7460616e731f66642c7246646e6f3d1ce5e91824911a21895d34e01b4620b0957cb75ba874ff860907f1f5b7bbb84a3aa8c481cc5f5a1ab03f58af95d59d6a0d5cd4697e7c1c0200000000000018d41ae5c723431c4d4751a988dad9fd35839ef7c34386b3c32c97de67590a2434168731ba140988b46f5bf3364b9a904ee93c30f1c0a0", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) 19:20:29 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:29 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x4, 0x3, 0x1}]}, 0x30}}, 0x0) 19:20:29 executing program 0: mkdirat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7460616e731f66642c7246646e6f3d1ce5e91824911a21895d34e01b4620b0957cb75ba874ff860907f1f5b7bbb84a3aa8c481cc5f5a1ab03f58af95d59d6a0d5cd4697e7c1c0200000000000018d41ae5c723431c4d4751a988dad9fd35839ef7c34386b3c32c97de67590a2434168731ba140988b46f5bf3364b9a904ee93c30f1c0a0", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7460616e731f66642c7246646e6f3d1ce5e91824911a21895d34e01b4620b0957cb75ba874ff860907f1f5b7bbb84a3aa8c481cc5f5a1ab03f58af95d59d6a0d5cd4697e7c1c0200000000000018d41ae5c723431c4d4751a988dad9fd35839ef7c34386b3c32c97de67590a2434168731ba140988b46f5bf3364b9a904ee93c30f1c0a0", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) (async) 19:20:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x5, 0x1}]}, 0x30}}, 0x0) 19:20:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x8) creat(&(0x7f0000000180)='./file0\x00', 0x22) 19:20:29 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 201.552848][ T8434] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 201.558320][ T8437] loop2: detected capacity change from 0 to 512 [ 201.575237][ T8437] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled 19:20:29 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x6, 0x1}]}, 0x30}}, 0x0) [ 201.614555][ T8437] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 201.619025][ T8450] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 201.682665][ T8459] netlink: 'syz-executor.3': attribute type 6 has an invalid length. [ 201.688384][ T8437] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 [ 201.699729][ T8441] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) 19:20:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) (async, rerun: 32) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x0) (async, rerun: 32) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x8) creat(&(0x7f0000000180)='./file0\x00', 0x22) 19:20:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x7, 0x1}]}, 0x30}}, 0x0) 19:20:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x8000000000, 0x0) 19:20:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x201000e, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:30 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) (async, rerun: 32) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) (rerun: 32) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x0) (async) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x8) (async) creat(&(0x7f0000000180)='./file0\x00', 0x22) 19:20:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x8, 0x1}]}, 0x30}}, 0x0) 19:20:30 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x9, 0x1}]}, 0x30}}, 0x0) 19:20:30 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') r1 = open_tree(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="74726129db3d646e6f3d00000000006480c564d75f0a4caa384656759119c4a1fd39dd8fe48c345c5ccc275407b00010f2f47eca26aac2f198da9874fc7df3a56b7a8a83215178c6ca228451fac75dd00d1c3855654b13c6f1102367a945c8b5a37fe67746162378", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00', @ANYRES32=r1]) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) [ 202.429269][ T8480] loop2: detected capacity change from 0 to 512 [ 202.452309][ T8480] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 202.468290][ T8480] EXT4-fs (loop2): external journal device major/minor numbers have changed 19:20:30 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0xa, 0x1}]}, 0x30}}, 0x0) 19:20:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') r1 = open_tree(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="74726129db3d646e6f3d00000000006480c564d75f0a4caa384656759119c4a1fd39dd8fe48c345c5ccc275407b00010f2f47eca26aac2f198da9874fc7df3a56b7a8a83215178c6ca228451fac75dd00d1c3855654b13c6f1102367a945c8b5a37fe67746162378", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00', @ANYRES32=r1]) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) [ 202.496402][ T8480] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 [ 202.555937][ T8475] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) 19:20:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0xedc000000000, 0x0) 19:20:31 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x201000f, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') r1 = open_tree(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="74726129db3d646e6f3d00000000006480c564d75f0a4caa384656759119c4a1fd39dd8fe48c345c5ccc275407b00010f2f47eca26aac2f198da9874fc7df3a56b7a8a83215178c6ca228451fac75dd00d1c3855654b13c6f1102367a945c8b5a37fe67746162378", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00', @ANYRES32=r1]) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') (async) open_tree(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x800) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="74726129db3d646e6f3d00000000006480c564d75f0a4caa384656759119c4a1fd39dd8fe48c345c5ccc275407b00010f2f47eca26aac2f198da9874fc7df3a56b7a8a83215178c6ca228451fac75dd00d1c3855654b13c6f1102367a945c8b5a37fe67746162378", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00', @ANYRES32=r1]) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) (async) 19:20:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0xb, 0x1}]}, 0x30}}, 0x0) 19:20:31 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766e46e6f3d", @ANYRESHEX=r0, @ANYBLOB=',\x00']) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) 19:20:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x10, 0x1}]}, 0x30}}, 0x0) [ 203.292188][ T8512] loop2: detected capacity change from 0 to 512 [ 203.305462][ T8512] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 203.314641][ T8512] EXT4-fs (loop2): external journal device major/minor numbers have changed 19:20:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x11, 0x1}]}, 0x30}}, 0x0) 19:20:31 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766e46e6f3d", @ANYRESHEX=r0, @ANYBLOB=',\x00']) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766e46e6f3d", @ANYRESHEX=r0, @ANYBLOB=',\x00']) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) (async) 19:20:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x13, 0x1}]}, 0x30}}, 0x0) [ 203.344064][ T8521] 9pnet_fd: Insufficient options for proto=fd [ 203.370186][ T8512] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 [ 203.400468][ T8530] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 203.416974][ T8529] 9pnet_fd: Insufficient options for proto=fd [ 203.429838][ T8534] 9pnet_fd: Insufficient options for proto=fd 19:20:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010010, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x1000000000000, 0x0) 19:20:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766e46e6f3d", @ANYRESHEX=r0, @ANYBLOB=',\x00']) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) 19:20:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x30}}, 0x0) 19:20:32 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x48, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:32 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}]}, 0x30}}, 0x0) 19:20:32 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x48, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) 19:20:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}]}, 0x30}}, 0x0) [ 204.171077][ T8542] 9pnet_fd: Insufficient options for proto=fd [ 204.194098][ T8549] loop2: detected capacity change from 0 to 512 19:20:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}]}, 0x30}}, 0x0) 19:20:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') (async) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) (async) [ 204.218211][ T8549] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 204.228795][ T8549] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 204.239385][ T8559] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) 19:20:32 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x48, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010011, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$eJzs201vVFUfAPD/vdMC5eVp4cEXELWKRuJLSwsqCzcYTdiYmOgCl7UUggzU0JoIIVKNwaUhfgB1aeIncIUbo6w0bnVvTIhhI7owY+7MvWVoZ+pMp9OhzO+X3Pace0/vOf/ee2bOPWcmgL41mv1IIrZHxC8RMVzL3llgtPbr1s1L03/dvDSdRKXyxh9JtdyfNy9NF0U/Gxqq/t6Wn3MgItKPkyUnrJm7cPHMVLk8cz7Pj8+ffXd87sLF506fnTo1c2rm3OSRI4cPTbz4wuTzaxLnjqytez+Y3bfn2FtXX5s+fvXtH77OmrU9P14fR81Ix3WOxmij0Kue7Pjsd5frO2+nk4GGRa5tW7/m0KJS1PrpYLX/D0cpbl+84Xj1o542Dui2dPOyXaUisVAB7mHZaB7oR8Ubffb8W2zrOPbouRtHY3Ee41a+1Y4MRJo9w4/Uno12dKn+0Yg4vvD359kWDechAADW1rWjEfFso/FfGvfXlftfvjY0EhE7I2JXRPw/InZHxH0R1bIPRMSDbdY/uiS/fPzz09CqAmtRNv57KV/bunP8lxZFRkp5bkc1/sHk5OnyzMH8f3IgBjdn+YkV6vj2lZ8/bXasfvyXbVn9xVgwb8fvA0sm6E5MzU91EnO9Gx9G7B1oFH+yuBKQjY/3RMTeVZw/u3inn/5qX7Pj/x3/ChqvM7Wl8mXEU7XrvxBL4i8kK69Pjm+J8szB8eKuWO76j1deb1Z/R/Gvgez6b214/y/GP5LUr9fOtV/HlV8/afpMs9r7f1PyZjW9Kd/3/tT8/PmJiE3JwvL9k7f/tsgX5bP4D+xv3P93RfzzRf53D0VEdhM/HBGPRMSjedsfi4jHI2L/CvF///IT76w+/u7K4j/R1vVvP1E68903zepv7fofrqYO5Htaef1rtYGd/O8AAABgo0irn4FP0rHFdJqOjdU+w787tqbl2bn5Z07OvnfuRO2z8iMxmBYzXcN186ET+dxwkZ9ckj9UnTeuVCqVoWp+bHq23K01daA125r0/8xvpV63Dui6ltbRikWYZt9oAzakNVhHBzYo/R/6l/4P/Uv/h/7VqP9fjrjVg6YA68z7P/Qv/R/6l/4P/Uv/h77Uyff6V0rsOtatM99ridLd0Yy2E5HeFc1YXSJtdGhLRPSiPZsjotXCl9ethb1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgb/wYAAP//EUHlYw==") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) [ 204.268708][ T8549] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 [ 204.386278][ T8572] loop2: detected capacity change from 0 to 512 [ 204.401979][ T8572] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 204.410738][ T8572] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 204.435982][ T8572] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x4000000000000, 0x0) 19:20:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}]}, 0x30}}, 0x0) 19:20:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') (async) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) (async) 19:20:33 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:33 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010012, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}]}, 0x30}}, 0x0) 19:20:33 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x4, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) [ 205.019544][ T8582] loop2: detected capacity change from 0 to 512 [ 205.041008][ T8582] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled 19:20:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xa}]}, 0x30}}, 0x0) 19:20:33 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) [ 205.065529][ T8582] EXT4-fs (loop2): external journal device major/minor numbers have changed 19:20:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xb}]}, 0x30}}, 0x0) [ 205.109236][ T8599] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 205.121773][ T8582] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x100000000000000, 0x0) 19:20:33 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$inet6(r1, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x4, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) 19:20:33 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x38, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010014, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x10}]}, 0x30}}, 0x0) 19:20:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x11}]}, 0x30}}, 0x0) 19:20:33 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x38, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x13}]}, 0x30}}, 0x0) 19:20:33 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x38, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 205.899127][ T8613] loop2: detected capacity change from 0 to 512 [ 205.909287][ T8613] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 205.927706][ T8613] EXT4-fs (loop2): external journal device major/minor numbers have changed 19:20:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x300}]}, 0x30}}, 0x0) 19:20:34 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x4c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 205.971138][ T8612] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 205.995818][ T8613] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:34 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$inet6(r1, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0xf}}, 0x0) 19:20:34 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x4c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x201001e, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x200000000000000, 0x0) 19:20:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x4, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) (async, rerun: 64) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) (rerun: 64) 19:20:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x10}}, 0x0) 19:20:34 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x4c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x14}}, 0x0) 19:20:34 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x0]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 206.763317][ T8647] loop2: detected capacity change from 0 to 512 [ 206.780946][ T8647] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 206.799443][ T8647] EXT4-fs (loop2): external journal device major/minor numbers have changed 19:20:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x140}}, 0x0) 19:20:34 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x0]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 206.846382][ T8647] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 [ 206.871498][ T8644] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) 19:20:34 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$inet6(r1, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:35 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x7ff, 0x0]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010022, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0xec0}}, 0x0) [ 206.981331][ T8669] loop2: detected capacity change from 0 to 512 [ 207.038708][ T8671] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) 19:20:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x204000000000000, 0x0) 19:20:35 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x4c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfffff801, 0x3f, 0x0, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x33fe0}}, 0x0) 19:20:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x32bf}, &(0x7f0000000180)=0x8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e24, 0x5, @rand_addr=' \x01\x00', 0x1}, 0x1c) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) 19:20:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010024, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$eJzs201vVFUfAPD/vdMC5eVp4cEXELWKRuJLSwsqCzcYTdiYmOgCl7UUggzU0JoIIVKNwaUhfgB1aeIncIUbo6w0bnVvTIhhI7owY+7MvWVoZ+pMp9OhzO+X3Pace0/vOf/ee2bOPWcmgL41mv1IIrZHxC8RMVzL3llgtPbr1s1L03/dvDSdRKXyxh9JtdyfNy9NF0U/Gxqq/t6Wn3MgItKPkyUnrJm7cPHMVLk8cz7Pj8+ffXd87sLF506fnTo1c2rm3OSRI4cPTbz4wuTzaxLnjqytez+Y3bfn2FtXX5s+fvXtH77OmrU9P14fR81Ix3WOxmij0Kue7Pjsd5frO2+nk4GGRa5tW7/m0KJS1PrpYLX/D0cpbl+84Xj1o542Dui2dPOyXaUisVAB7mHZaB7oR8Ubffb8W2zrOPbouRtHY3Ee41a+1Y4MRJo9w4/Uno12dKn+0Yg4vvD359kWDechAADW1rWjEfFso/FfGvfXlftfvjY0EhE7I2JXRPw/InZHxH0R1bIPRMSDbdY/uiS/fPzz09CqAmtRNv57KV/bunP8lxZFRkp5bkc1/sHk5OnyzMH8f3IgBjdn+YkV6vj2lZ8/bXasfvyXbVn9xVgwb8fvA0sm6E5MzU91EnO9Gx9G7B1oFH+yuBKQjY/3RMTeVZw/u3inn/5qX7Pj/x3/ChqvM7Wl8mXEU7XrvxBL4i8kK69Pjm+J8szB8eKuWO76j1deb1Z/R/Gvgez6b214/y/GP5LUr9fOtV/HlV8/afpMs9r7f1PyZjW9Kd/3/tT8/PmJiE3JwvL9k7f/tsgX5bP4D+xv3P93RfzzRf53D0VEdhM/HBGPRMSjedsfi4jHI2L/CvF///IT76w+/u7K4j/R1vVvP1E68903zepv7fofrqYO5Htaef1rtYGd/O8AAABgo0irn4FP0rHFdJqOjdU+w787tqbl2bn5Z07OvnfuRO2z8iMxmBYzXcN186ET+dxwkZ9ckj9UnTeuVCqVoWp+bHq23K01daA125r0/8xvpV63Dui6ltbRikWYZt9oAzakNVhHBzYo/R/6l/4P/Uv/h/7VqP9fjrjVg6YA68z7P/Qv/R/6l/4P/Uv/h77Uyff6V0rsOtatM99ridLd0Yy2E5HeFc1YXSJtdGhLRPSiPZsjotXCl9ethb1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgb/wYAAP//EUHlYw==") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:35 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0xfffffdef}}, 0x0) 19:20:35 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x4c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfffff801, 0x3f, 0x0, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}, 0x2}, 0x0) [ 207.606617][ T8677] loop2: detected capacity change from 0 to 512 19:20:35 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x4c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfffff801, 0x3f, 0x0, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010025, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}, 0x3}, 0x0) [ 207.712481][ T8693] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 207.721851][ T8698] loop2: detected capacity change from 0 to 512 19:20:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}, 0x5}, 0x0) 19:20:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x32bf}, &(0x7f0000000180)=0x8) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) (async) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e24, 0x5, @rand_addr=' \x01\x00', 0x1}, 0x1c) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) 19:20:36 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x0, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010034, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x600000000000000, 0x0) 19:20:36 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}, 0x6}, 0x0) 19:20:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x32bf}, &(0x7f0000000180)=0x8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e24, 0x5, @rand_addr=' \x01\x00', 0x1}, 0x1c) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') (async) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x32bf}, &(0x7f0000000180)=0x8) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) (async) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e24, 0x5, @rand_addr=' \x01\x00', 0x1}, 0x1c) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) (async) 19:20:36 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x0, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:36 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x3f, 0x0, 0x0, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 208.475676][ T8709] loop2: detected capacity change from 0 to 512 19:20:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}, 0x8}, 0x0) 19:20:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010043, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:36 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x4c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfffff801, 0x3f, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}, 0x9}, 0x0) 19:20:36 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x4c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfffff801, 0x3f, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x27, 0x80008, 0xb9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa}, {0x4}}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x58}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000010000000000000060000000d62000101000000ad675000f9ffffff950000000000000097f099bd480fb261a76ceab896549fdda9d7ade88bb762ce952a08765856287c481f1479a559763af697315d13973ad6b12cc1c78af8bc1e55d08169b3bd8c320bfb7e67bf96746f627364726f797ef0938e6421b8c1119efad52a2baa85849bba716836650205810effc7dfb0a22f7dbc0b4acead459b29d59e0839e66f5b6e693d0281a0ff7eff12e8b5b2f78d7d50bb515beda859a78e58e141df6b2fce32acae202b4e0462c8"], &(0x7f0000000180)='GPL\x00', 0x7, 0x52, &(0x7f00000001c0)=""/82, 0x40f00, 0x7, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x400, 0x6660}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x1], &(0x7f0000000340)=[{0x5, 0x1, 0x6, 0xc}, {0x0, 0x3, 0xd, 0x3}, {0x4, 0x4, 0x2, 0x4}, {0x3, 0x2, 0x6}, {0x3, 0x2, 0x1, 0x7}, {0x0, 0x3, 0xc, 0x7}], 0x10, 0x7}, 0x90) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r3}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) [ 208.588922][ T8727] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 208.601172][ T8726] loop2: detected capacity change from 0 to 512 [ 208.644314][ T8726] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 208.661873][ T27] audit: type=1400 audit(1696188036.697:219): avc: denied { create } for pid=8740 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 208.661964][ T8726] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 208.728697][ T8726] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x604000000000000, 0x0) 19:20:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}, 0xa}, 0x0) 19:20:37 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x4c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfffff801, 0x3f, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x27, 0x80008, 0xb9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa}, {0x4}}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x58}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000010000000000000060000000d62000101000000ad675000f9ffffff950000000000000097f099bd480fb261a76ceab896549fdda9d7ade88bb762ce952a08765856287c481f1479a559763af697315d13973ad6b12cc1c78af8bc1e55d08169b3bd8c320bfb7e67bf96746f627364726f797ef0938e6421b8c1119efad52a2baa85849bba716836650205810effc7dfb0a22f7dbc0b4acead459b29d59e0839e66f5b6e693d0281a0ff7eff12e8b5b2f78d7d50bb515beda859a78e58e141df6b2fce32acae202b4e0462c8"], &(0x7f0000000180)='GPL\x00', 0x7, 0x52, &(0x7f00000001c0)=""/82, 0x40f00, 0x7, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x400, 0x6660}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x1], &(0x7f0000000340)=[{0x5, 0x1, 0x6, 0xc}, {0x0, 0x3, 0xd, 0x3}, {0x4, 0x4, 0x2, 0x4}, {0x3, 0x2, 0x6}, {0x3, 0x2, 0x1, 0x7}, {0x0, 0x3, 0xc, 0x7}], 0x10, 0x7}, 0x90) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r3}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) socket(0x10, 0x3, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) (async) socket(0x27, 0x80008, 0xb9) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) (async) sendmsg$nl_route_sched(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa}, {0x4}}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x58}}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000010000000000000060000000d62000101000000ad675000f9ffffff950000000000000097f099bd480fb261a76ceab896549fdda9d7ade88bb762ce952a08765856287c481f1479a559763af697315d13973ad6b12cc1c78af8bc1e55d08169b3bd8c320bfb7e67bf96746f627364726f797ef0938e6421b8c1119efad52a2baa85849bba716836650205810effc7dfb0a22f7dbc0b4acead459b29d59e0839e66f5b6e693d0281a0ff7eff12e8b5b2f78d7d50bb515beda859a78e58e141df6b2fce32acae202b4e0462c8"], &(0x7f0000000180)='GPL\x00', 0x7, 0x52, &(0x7f00000001c0)=""/82, 0x40f00, 0x7, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x400, 0x6660}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x1], &(0x7f0000000340)=[{0x5, 0x1, 0x6, 0xc}, {0x0, 0x3, 0xd, 0x3}, {0x4, 0x4, 0x2, 0x4}, {0x3, 0x2, 0x6}, {0x3, 0x2, 0x1, 0x7}, {0x0, 0x3, 0xc, 0x7}], 0x10, 0x7}, 0x90) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r3}}) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) (async) 19:20:37 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010046, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$eJzs201vVFUfAPD/vdMC5eVp4cEXELWKRuJLSwsqCzcYTdiYmOgCl7UUggzU0JoIIVKNwaUhfgB1aeIncIUbo6w0bnVvTIhhI7owY+7MvWVoZ+pMp9OhzO+X3Pace0/vOf/ee2bOPWcmgL41mv1IIrZHxC8RMVzL3llgtPbr1s1L03/dvDSdRKXyxh9JtdyfNy9NF0U/Gxqq/t6Wn3MgItKPkyUnrJm7cPHMVLk8cz7Pj8+ffXd87sLF506fnTo1c2rm3OSRI4cPTbz4wuTzaxLnjqytez+Y3bfn2FtXX5s+fvXtH77OmrU9P14fR81Ix3WOxmij0Kue7Pjsd5frO2+nk4GGRa5tW7/m0KJS1PrpYLX/D0cpbl+84Xj1o542Dui2dPOyXaUisVAB7mHZaB7oR8Ubffb8W2zrOPbouRtHY3Ee41a+1Y4MRJo9w4/Uno12dKn+0Yg4vvD359kWDechAADW1rWjEfFso/FfGvfXlftfvjY0EhE7I2JXRPw/InZHxH0R1bIPRMSDbdY/uiS/fPzz09CqAmtRNv57KV/bunP8lxZFRkp5bkc1/sHk5OnyzMH8f3IgBjdn+YkV6vj2lZ8/bXasfvyXbVn9xVgwb8fvA0sm6E5MzU91EnO9Gx9G7B1oFH+yuBKQjY/3RMTeVZw/u3inn/5qX7Pj/x3/ChqvM7Wl8mXEU7XrvxBL4i8kK69Pjm+J8szB8eKuWO76j1deb1Z/R/Gvgez6b214/y/GP5LUr9fOtV/HlV8/afpMs9r7f1PyZjW9Kd/3/tT8/PmJiE3JwvL9k7f/tsgX5bP4D+xv3P93RfzzRf53D0VEdhM/HBGPRMSjedsfi4jHI2L/CvF///IT76w+/u7K4j/R1vVvP1E68903zepv7fofrqYO5Htaef1rtYGd/O8AAABgo0irn4FP0rHFdJqOjdU+w787tqbl2bn5Z07OvnfuRO2z8iMxmBYzXcN186ET+dxwkZ9ckj9UnTeuVCqVoWp+bHq23K01daA125r0/8xvpV63Dui6ltbRikWYZt9oAzakNVhHBzYo/R/6l/4P/Uv/h/7VqP9fjrjVg6YA68z7P/Qv/R/6l/4P/Uv/h77Uyff6V0rsOtatM99ridLd0Yy2E5HeFc1YXSJtdGhLRPSiPZsjotXCl9ethb1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgb/wYAAP//EUHlYw==") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}, 0xb}, 0x0) 19:20:37 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x4c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfffff801, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}, 0x10}, 0x0) 19:20:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x27, 0x80008, 0xb9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa}, {0x4}}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x58}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000010000000000000060000000d62000101000000ad675000f9ffffff950000000000000097f099bd480fb261a76ceab896549fdda9d7ade88bb762ce952a08765856287c481f1479a559763af697315d13973ad6b12cc1c78af8bc1e55d08169b3bd8c320bfb7e67bf96746f627364726f797ef0938e6421b8c1119efad52a2baa85849bba716836650205810effc7dfb0a22f7dbc0b4acead459b29d59e0839e66f5b6e693d0281a0ff7eff12e8b5b2f78d7d50bb515beda859a78e58e141df6b2fce32acae202b4e0462c8"], &(0x7f0000000180)='GPL\x00', 0x7, 0x52, &(0x7f00000001c0)=""/82, 0x40f00, 0x7, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x400, 0x6660}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x1], &(0x7f0000000340)=[{0x5, 0x1, 0x6, 0xc}, {0x0, 0x3, 0xd, 0x3}, {0x4, 0x4, 0x2, 0x4}, {0x3, 0x2, 0x6}, {0x3, 0x2, 0x1, 0x7}, {0x0, 0x3, 0xc, 0x7}], 0x10, 0x7}, 0x90) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r3}}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) socket(0x10, 0x3, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) (async) socket(0x27, 0x80008, 0xb9) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) (async) sendmsg$nl_route_sched(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa}, {0x4}}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x58}}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000010000000000000060000000d62000101000000ad675000f9ffffff950000000000000097f099bd480fb261a76ceab896549fdda9d7ade88bb762ce952a08765856287c481f1479a559763af697315d13973ad6b12cc1c78af8bc1e55d08169b3bd8c320bfb7e67bf96746f627364726f797ef0938e6421b8c1119efad52a2baa85849bba716836650205810effc7dfb0a22f7dbc0b4acead459b29d59e0839e66f5b6e693d0281a0ff7eff12e8b5b2f78d7d50bb515beda859a78e58e141df6b2fce32acae202b4e0462c8"], &(0x7f0000000180)='GPL\x00', 0x7, 0x52, &(0x7f00000001c0)=""/82, 0x40f00, 0x7, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x400, 0x6660}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x1], &(0x7f0000000340)=[{0x5, 0x1, 0x6, 0xc}, {0x0, 0x3, 0xd, 0x3}, {0x4, 0x4, 0x2, 0x4}, {0x3, 0x2, 0x6}, {0x3, 0x2, 0x1, 0x7}, {0x0, 0x3, 0xc, 0x7}], 0x10, 0x7}, 0x90) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r3}}) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) (async) [ 209.348465][ T8755] loop2: detected capacity change from 0 to 512 [ 209.366685][ T8755] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 209.375398][ T8755] EXT4-fs (loop2): external journal device major/minor numbers have changed 19:20:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}, 0x11}, 0x0) 19:20:37 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x4c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfffff801, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) [ 209.425264][ T8753] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 209.437802][ T8755] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 19:20:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x700000000000000, 0x0) 19:20:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2010048, &(0x7f00000003c0)={[{@block_validity}, {@nouid32}, {@resuid}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@jqfmt_vfsv0}, {@usrjquota, 0x30}]}, 0x84, 0x460, &(0x7f00000004c0)="$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") r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r0, 0x300, 0x70bd39, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 19:20:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}, 0x13}, 0x0) 19:20:38 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x4c, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfffff801, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "7f0577d582f2aef25fb1c98e8e7df16358136610faa19b5f8f7dcff6141a1a95b95d482cc9d09080637b7b05d521e870e5d71c9975225064366287e1334fe21c5b0bbaf044a3fcb858a15f7e77c828af16d700ec1e52853ab83900cc8911772cbd0656c7743717fe86def6034caac5fd23ed70a5b59b1285001919027365cfb06451a850e6b648f67c937c90dcb4b8c4ade42ce1db4bfe807a73b6d7a83e9afe1539f5348fc51748d6b7b005b8328b3d7b013f46634a4dfd1911708fb7009ab90c2fe63471cc498d468540958fe8a0e06342c1dfec43bff792166ad03c13b92c64939e38dcfc0817125c569b6160dd31d6c690a4e868959a36b0b84883d67013030cc9200bf60f7275b26b"}}}}}}}, 0x0) 19:20:38 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x17) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x31}) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_hwaddr=@local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000440)={{0x1, 0x1f}, 'port1\x00', 0x10}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000533000/0x2000)=nil, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xbf, 0x4) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0x116d962d5f73552, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)=""/4111, 0xd80}], 0x1}}], 0x1, 0x122, 0x0) close(r1) 19:20:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}, 0x300}, 0x0) 19:20:38 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1001, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000006c0), r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r6, 0x632f1f9cb7442d52}}, 0x10) getdents64(r3, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r2, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xcf65}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(0x0, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r11, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r12 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r12, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r11, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x6, 0x8]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc080}, 0x20000040) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xfffff801, 0x0, 0x0, 0x7ff, 0x7f]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) openat$cgroup_ro(r0, &(0x7f0000000540)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r5, 0x101, 0x1ff, 0xda4, 0x7fffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="04002cbd7000ffdbdf250100000008140200ffff000014000100fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x20000040) syz_emit_ethernet(0x1b5, &(0x7f0000000700)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "70d1ed", 0x17f, 0x3c, 0x1, @local, @mcast2, {[@dstopts={0x0, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}]}], {{0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1, 0x880b, 0xffffffffffffffb7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}}}}}}}, 0x0) 19:20:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}, 0x1, 0x2}, 0x0) [ 210.216263][ T8788] loop2: detected capacity change from 0 to 512 [ 210.249422][ T8788] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled 19:20:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x30}, 0x1, 0x3}, 0x0) [ 210.273408][ T8788] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 210.301011][ T8803] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 210.321343][ T8788] EXT4-fs (loop2): failed to open journal device unknown-block(0,7) -6 [ 248.413245][ C0] ================================================================== [ 248.421423][ C0] BUG: KCSAN: data-race in tick_sched_timer / tick_sched_timer [ 248.429011][ C0] [ 248.431331][ C0] write to 0xffffffff85f16c40 of 4 bytes by interrupt on cpu 1: [ 248.439000][ C0] tick_sched_timer+0x2ad/0x2c0 [ 248.443877][ C0] __hrtimer_run_queues+0x217/0x700 [ 248.449110][ C0] hrtimer_interrupt+0x20d/0x7b0 [ 248.454049][ C0] __sysvec_apic_timer_interrupt+0x52/0x190 [ 248.459965][ C0] sysvec_apic_timer_interrupt+0x68/0x80 [ 248.465624][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 248.471781][ C0] acpi_safe_halt+0x20/0x30 [ 248.476738][ C0] acpi_idle_do_entry+0x19/0x30 [ 248.481612][ C0] acpi_idle_enter+0x96/0xb0 [ 248.486231][ C0] cpuidle_enter_state+0xc6/0x260 [ 248.491269][ C0] cpuidle_enter+0x40/0x60 [ 248.495718][ C0] do_idle+0x194/0x230 [ 248.499803][ C0] cpu_startup_entry+0x24/0x30 [ 248.504603][ C0] start_secondary+0x82/0x90 [ 248.509224][ C0] secondary_startup_64_no_verify+0x167/0x16b [ 248.515476][ C0] [ 248.517792][ C0] read to 0xffffffff85f16c40 of 4 bytes by interrupt on cpu 0: [ 248.525343][ C0] tick_sched_timer+0x3d/0x2c0 [ 248.530166][ C0] __hrtimer_run_queues+0x217/0x700 [ 248.535474][ C0] hrtimer_interrupt+0x20d/0x7b0 [ 248.540558][ C0] __sysvec_apic_timer_interrupt+0x52/0x190 [ 248.546489][ C0] sysvec_apic_timer_interrupt+0x68/0x80 [ 248.552285][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 248.558298][ C0] acpi_safe_halt+0x20/0x30 [ 248.562857][ C0] acpi_idle_do_entry+0x19/0x30 [ 248.567722][ C0] acpi_idle_enter+0x96/0xb0 [ 248.572338][ C0] cpuidle_enter_state+0xc6/0x260 [ 248.577391][ C0] cpuidle_enter+0x40/0x60 [ 248.581852][ C0] do_idle+0x194/0x230 [ 248.585942][ C0] cpu_startup_entry+0x24/0x30 [ 248.590726][ C0] rest_init+0xf3/0x100 [ 248.594896][ C0] arch_call_rest_init+0x9/0x10 [ 248.599816][ C0] start_kernel+0x57d/0x5d0 [ 248.604434][ C0] x86_64_start_reservations+0x2a/0x30 [ 248.609909][ C0] x86_64_start_kernel+0x94/0xa0 [ 248.614884][ C0] secondary_startup_64_no_verify+0x167/0x16b [ 248.621154][ C0] [ 248.623480][ C0] value changed: 0xffffffff -> 0x00000001 [ 248.629714][ C0] [ 248.632040][ C0] Reported by Kernel Concurrency Sanitizer on: [ 248.638187][ C0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.6.0-rc3-syzkaller-00214-ge402b08634b3 #0 [ 248.647991][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 248.658050][ C0] ==================================================================