{0x1f, r4, 0x3}, 0xc) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f0000000040)={0x20002007}) 18:35:04 executing program 1 (fault-call:6 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 18:35:04 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084504, &(0x7f0000000080)=""/181) 18:35:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x5450, &(0x7f0000000080)=""/181) [ 713.492419] audit: type=1400 audit(1546194904.627:65): avc: denied { block_suspend } for pid=23295 comm="syz-executor3" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 18:35:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40200, 0x0) sendmmsg$alg(r1, &(0x7f0000000300)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="a7e28478b06c7789621f929fcecbb850b55e657a7ac3590b0136c3e414ce9aa62c0da307a6b712c147eed4e68d623fa9f541a58a7eb215d6122de02cd633ddca4f1c86f835223e42820a724ab75995e9dbafa4423321b5c14c9df2108ab218b3769a53deb1", 0x65}, {&(0x7f0000000180)="6ed09b4aa0d1aa617ce475ffdc4b062565805ede92aa3c9d8996591d1c7534e00e01b55eb4cd40c3714c708039f15972fca4ab6237bc7ed2db29f793848b0b6796067219f2413a5151b67717654251313e437d6ca85a8d2ecaa93e2e060efddfd901b67574af93bd73916dc0bd587b5feb8de5e644d800a8bcccd3305a5acf26866b466f80bd627381df4298c798a1f4361a", 0x92}], 0x2, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x90, 0x1}], 0x1, 0x40040c0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 713.647150] FAULT_INJECTION: forcing a failure. [ 713.647150] name failslab, interval 1, probability 0, space 0, times 0 [ 713.719691] CPU: 1 PID: 23313 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 713.726763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.736117] Call Trace: [ 713.738726] dump_stack+0x1d3/0x2c6 [ 713.742374] ? dump_stack_print_info.cold.1+0x20/0x20 [ 713.747589] ? avc_has_perm_noaudit+0x630/0x630 [ 713.752283] should_fail.cold.4+0xa/0x17 [ 713.756378] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 713.761498] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 713.767052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.772591] ? graph_lock+0x270/0x270 [ 713.772621] ? find_held_lock+0x36/0x1c0 [ 713.772659] ? __lock_is_held+0xb5/0x140 [ 713.784583] ? ___might_sleep+0x1ed/0x300 [ 713.788774] ? arch_local_save_flags+0x40/0x40 [ 713.793392] ? lock_release+0xa00/0xa00 [ 713.797372] ? arch_local_save_flags+0x40/0x40 [ 713.801989] ? key_validate+0x240/0x240 [ 713.805980] __should_failslab+0x124/0x180 [ 713.810232] should_failslab+0x9/0x14 [ 713.814042] __kmalloc_track_caller+0x2d5/0x750 [ 713.818738] ? down_read+0x8d/0x120 [ 713.822738] ? dh_data_from_key+0x133/0x3c0 [ 713.827071] ? __down_interruptible+0x700/0x700 [ 713.831749] ? dh_data_from_key+0x207/0x3c0 [ 713.836100] kmemdup+0x24/0x50 [ 713.839300] dh_data_from_key+0x207/0x3c0 [ 713.843463] ? dh_crypto_done+0x90/0x90 [ 713.847467] __keyctl_dh_compute+0x56e/0x1bf0 [ 713.851969] ? find_held_lock+0x36/0x1c0 [ 713.856057] ? copy_overflow+0x30/0x30 [ 713.859966] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 713.865604] ? proc_fail_nth_write+0x9e/0x210 [ 713.870141] ? proc_cwd_link+0x1d0/0x1d0 [ 713.870176] ? __might_fault+0x12b/0x1e0 [ 713.870197] ? lock_release+0xa00/0xa00 [ 713.870217] ? arch_local_save_flags+0x40/0x40 [ 713.878322] ? __lock_is_held+0xb5/0x140 [ 713.890937] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 713.896483] ? _copy_from_user+0xdf/0x150 [ 713.900641] keyctl_dh_compute+0xc5/0x11f [ 713.904836] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 713.909603] ? lockdep_hardirqs_on+0x421/0x5c0 [ 713.914199] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 713.919670] __x64_sys_keyctl+0x17a/0x430 [ 713.923846] do_syscall_64+0x1b9/0x820 [ 713.927749] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 713.933127] ? syscall_return_slowpath+0x5e0/0x5e0 [ 713.938071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 713.942948] ? trace_hardirqs_on_caller+0x310/0x310 [ 713.947977] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 713.953002] ? prepare_exit_to_usermode+0x291/0x3b0 [ 713.953024] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 713.953047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.968064] RIP: 0033:0x457ec9 [ 713.971264] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 713.990172] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 713.997890] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 714.005169] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 714.012443] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 18:35:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 18:35:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000010}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x2c, r2, 0x0, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'yam0\x00'}}}, ["", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x24000010) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x8, 0x0, 0x0) 18:35:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x2ca) r1 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x4, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000280)={0x0, 0x24aa}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000300)={r2, @in6={{0xa, 0x4e24, 0x1, @mcast1, 0x975}}, 0x2, 0x7ff, 0x0, 0xe5}, &(0x7f00000003c0)=0x98) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x3, 0x4000) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x1, 0xbf, 0x0, 0xa7, 0xa845, 0x7f, 0x0, {0x0, @in={{0x2, 0x4e24, @empty}}, 0x9, 0x0, 0x5, 0x4, 0x2}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={r4, 0xd}, &(0x7f00000001c0)=0x8) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:05 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x15c, 0x0) [ 714.019721] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 714.026990] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:05 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x5450, &(0x7f0000000080)=""/181) 18:35:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x400445a0, &(0x7f0000000080)=""/181) 18:35:05 executing program 1 (fault-call:6 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x3, 0x0, 0x0) 18:35:05 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x137, 0x0) 18:35:05 executing program 3: ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000180)={0x0, 0x80000, 0xffffffffffffffff}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0xf5f5cd311a759e1c, r0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syslog(0x5, &(0x7f00000000c0)=""/147, 0x93) r2 = open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$unix(r2, &(0x7f00000002c0)={&(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000e40)="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", 0x1000}], 0x1, 0x0, 0x0, 0x1}, 0x4045) syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0xbd9, 0x0) renameat2(r2, &(0x7f0000000380)='./file0\x00', r2, &(0x7f00000003c0)='./file1\x00', 0x0) getpgrp(0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x800, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000200), 0x800000080008002) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000000)) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:05 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40087602, &(0x7f0000000080)=""/181) 18:35:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x2, 0x0, 0x0) [ 714.376092] FAULT_INJECTION: forcing a failure. [ 714.376092] name failslab, interval 1, probability 0, space 0, times 0 [ 714.484706] CPU: 1 PID: 23355 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 714.491755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.491762] Call Trace: [ 714.491788] dump_stack+0x1d3/0x2c6 [ 714.491816] ? dump_stack_print_info.cold.1+0x20/0x20 [ 714.491839] ? avc_has_perm_noaudit+0x630/0x630 [ 714.503520] audit: type=1400 audit(1546194905.597:66): avc: denied { syslog } for pid=23358 comm="syz-executor3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 714.503771] should_fail.cold.4+0xa/0x17 [ 714.545477] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 714.550593] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 714.550620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.550651] ? graph_lock+0x270/0x270 [ 714.550674] ? find_held_lock+0x36/0x1c0 [ 714.550693] ? __lock_is_held+0xb5/0x140 [ 714.550726] ? ___might_sleep+0x1ed/0x300 [ 714.577828] ? arch_local_save_flags+0x40/0x40 [ 714.582419] ? lock_release+0xa00/0xa00 [ 714.586435] ? arch_local_save_flags+0x40/0x40 [ 714.591029] ? key_validate+0x240/0x240 [ 714.595019] __should_failslab+0x124/0x180 [ 714.599266] should_failslab+0x9/0x14 [ 714.603078] __kmalloc_track_caller+0x2d5/0x750 [ 714.607757] ? down_read+0x8d/0x120 [ 714.611398] ? dh_data_from_key+0x133/0x3c0 [ 714.615738] ? __down_interruptible+0x700/0x700 [ 714.620432] ? dh_data_from_key+0x207/0x3c0 [ 714.624808] kmemdup+0x24/0x50 [ 714.628014] dh_data_from_key+0x207/0x3c0 [ 714.632174] ? dh_crypto_done+0x90/0x90 [ 714.636171] __keyctl_dh_compute+0x5fb/0x1bf0 [ 714.640702] ? find_held_lock+0x36/0x1c0 [ 714.644795] ? copy_overflow+0x30/0x30 [ 714.648691] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 714.654256] ? proc_fail_nth_write+0x9e/0x210 [ 714.658760] ? proc_cwd_link+0x1d0/0x1d0 [ 714.662841] ? __might_fault+0x12b/0x1e0 [ 714.662864] ? lock_release+0xa00/0xa00 [ 714.662878] ? arch_local_save_flags+0x40/0x40 [ 714.662891] ? __lock_is_held+0xb5/0x140 [ 714.662931] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 714.685100] ? _copy_from_user+0xdf/0x150 [ 714.689290] keyctl_dh_compute+0xc5/0x11f [ 714.693453] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 714.698213] ? lockdep_hardirqs_on+0x421/0x5c0 [ 714.702815] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 714.708279] __x64_sys_keyctl+0x17a/0x430 [ 714.712442] do_syscall_64+0x1b9/0x820 [ 714.716351] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 714.721750] ? syscall_return_slowpath+0x5e0/0x5e0 [ 714.726687] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 714.731550] ? trace_hardirqs_on_caller+0x310/0x310 [ 714.736605] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 714.741636] ? prepare_exit_to_usermode+0x291/0x3b0 [ 714.746672] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 714.751536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 714.756731] RIP: 0033:0x457ec9 [ 714.759963] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:35:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40049409, &(0x7f0000000080)=""/181) 18:35:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2002, 0x40) ioctl$RTC_WIE_ON(r1, 0x700f) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000100), 0x16e}], 0x1, 0x200400d9) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="895a8c54c3d7", 0x6}, {&(0x7f0000000080)="5ab0c18f3893436421244955afd220d06fd7d2e0912aeda42479f5214a086e4086a7355682773df084ad7b8042afd46e83cc6206088c6964a24e3d20deaae17a083e35dc754c8de599ac6f41fd48ed763e2aec326c9e2a614ba6f1f6edf437f2f7eccf46a83bd096b1576e5c68ed90921ec6745b7f5cb3ebe4cf88ff7b943146ea8edeaa42b38111ffafe6", 0x8b}], 0x2, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x9}, @iv={0x28, 0x117, 0x2, 0x12, "1e2df9a322c9478a081ccb913a8cdbb3c252"}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x40, 0x117, 0x2, 0x27, "3bf7d6374be6ac5e92ed81fd4c8b3a86f4836b9c8da1e4bf57371cf7d6f384392429c3290958c1"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0x110}, 0x80) 18:35:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'authenc(crct10dif,cfb(twofish))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x297f, 0x402400) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x101) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendto(r0, &(0x7f00000001c0)="ce5e6c73a34382166045617be335a9082e72f3b68849bf822bbc26d777d960f5f087bb654c723c83850c919fe6e7780dc1138a6e156a54905b519e1789704c4766e5903e13ff9186c0000000000000000000000000f243ed8a6cec626f5221b6160c029c8a84953323c80d", 0x6b, 0x20000840, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x7, 0x5, 0x8000, "b681a90c9e2dd73be27f49aadd2114487df1e743671aca9678039edfc0a5858bb1fa7f58e3b82c8093a0cc03576a55619c9dc277f662af5c006bc5696e4f7c"}, 0x80) 18:35:05 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x173, 0x0) [ 714.778871] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 714.786586] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 714.793856] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 714.801127] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 [ 714.808402] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 714.815680] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:06 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x4b49, &(0x7f0000000080)=""/181) 18:35:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0xe000, 0x0, 0x0) 18:35:06 executing program 1 (fault-call:6 fault-nth:5): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:06 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40284504, &(0x7f0000000080)=""/181) 18:35:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400000, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 715.111496] FAULT_INJECTION: forcing a failure. [ 715.111496] name failslab, interval 1, probability 0, space 0, times 0 [ 715.149113] CPU: 1 PID: 23405 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 715.156168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.165526] Call Trace: [ 715.168126] dump_stack+0x1d3/0x2c6 [ 715.171775] ? dump_stack_print_info.cold.1+0x20/0x20 [ 715.176997] ? avc_has_perm_noaudit+0x630/0x630 [ 715.181701] should_fail.cold.4+0xa/0x17 [ 715.185778] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 715.190893] ? rcu_read_unlock_special+0x370/0x370 [ 715.195891] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 715.201488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.207033] ? graph_lock+0x270/0x270 [ 715.210852] ? find_held_lock+0x36/0x1c0 [ 715.214939] ? __lock_is_held+0xb5/0x140 [ 715.219024] ? ___might_sleep+0x1ed/0x300 [ 715.223181] ? arch_local_save_flags+0x40/0x40 [ 715.227770] ? lock_release+0xa00/0xa00 [ 715.231751] ? arch_local_save_flags+0x40/0x40 [ 715.236352] ? key_validate+0x240/0x240 [ 715.240352] __should_failslab+0x124/0x180 [ 715.244602] should_failslab+0x9/0x14 [ 715.248415] __kmalloc_track_caller+0x2d5/0x750 [ 715.253096] ? down_read+0x8d/0x120 [ 715.256736] ? dh_data_from_key+0x133/0x3c0 [ 715.261066] ? __down_interruptible+0x700/0x700 [ 715.265835] ? dh_data_from_key+0x207/0x3c0 [ 715.270174] kmemdup+0x24/0x50 [ 715.273381] dh_data_from_key+0x207/0x3c0 [ 715.277538] ? dh_crypto_done+0x90/0x90 [ 715.281528] __keyctl_dh_compute+0x67f/0x1bf0 [ 715.286033] ? find_held_lock+0x36/0x1c0 [ 715.290122] ? copy_overflow+0x30/0x30 [ 715.294026] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 715.299572] ? proc_fail_nth_write+0x9e/0x210 [ 715.304079] ? proc_cwd_link+0x1d0/0x1d0 [ 715.308169] ? __might_fault+0x12b/0x1e0 [ 715.312252] ? lock_release+0xa00/0xa00 [ 715.316236] ? arch_local_save_flags+0x40/0x40 [ 715.320831] ? __lock_is_held+0xb5/0x140 [ 715.324916] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 715.330476] ? _copy_from_user+0xdf/0x150 [ 715.334640] keyctl_dh_compute+0xc5/0x11f [ 715.338803] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 715.343567] ? lockdep_hardirqs_on+0x421/0x5c0 [ 715.348162] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 715.353626] __x64_sys_keyctl+0x17a/0x430 [ 715.357794] do_syscall_64+0x1b9/0x820 [ 715.361693] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 715.367078] ? syscall_return_slowpath+0x5e0/0x5e0 [ 715.372020] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 715.376872] ? trace_hardirqs_on_caller+0x310/0x310 [ 715.381899] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 715.386941] ? prepare_exit_to_usermode+0x291/0x3b0 [ 715.391970] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 715.396835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.402032] RIP: 0033:0x457ec9 [ 715.405229] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 715.424142] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 715.431860] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 715.439131] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 715.446401] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 [ 715.453674] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 18:35:06 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xc3, 0x0) 18:35:06 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x45, 0x0) 18:35:06 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x14c, 0x0) 18:35:06 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x8f, 0x0) 18:35:06 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1f3, 0x0) 18:35:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x14e}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 715.460966] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:06 executing program 1 (fault-call:6 fault-nth:6): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:06 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80044501, &(0x7f0000000080)=""/181) [ 715.695751] FAULT_INJECTION: forcing a failure. [ 715.695751] name failslab, interval 1, probability 0, space 0, times 0 [ 715.732372] CPU: 0 PID: 23435 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 715.739429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.748792] Call Trace: [ 715.751394] dump_stack+0x1d3/0x2c6 [ 715.755038] ? dump_stack_print_info.cold.1+0x20/0x20 [ 715.760238] ? save_stack+0xa9/0xd0 [ 715.763888] should_fail.cold.4+0xa/0x17 [ 715.767971] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.773346] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 715.778468] ? find_held_lock+0x36/0x1c0 [ 715.782547] ? dh_data_from_key+0x278/0x3c0 [ 715.786874] ? find_held_lock+0x36/0x1c0 [ 715.790976] ? ___might_sleep+0x1ed/0x300 [ 715.795134] ? kasan_check_write+0x14/0x20 [ 715.799373] ? arch_local_save_flags+0x40/0x40 [ 715.803982] ? up_read_non_owner+0x100/0x100 [ 715.808394] ? __down_interruptible+0x700/0x700 [ 715.813081] __should_failslab+0x124/0x180 [ 715.817326] should_failslab+0x9/0x14 [ 715.821129] __kmalloc+0x2e4/0x760 [ 715.824674] ? dh_crypto_done+0x90/0x90 [ 715.828660] ? __keyctl_dh_compute+0x6e1/0x1bf0 [ 715.833344] __keyctl_dh_compute+0x6e1/0x1bf0 [ 715.837843] ? find_held_lock+0x36/0x1c0 [ 715.841933] ? copy_overflow+0x30/0x30 [ 715.845832] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 715.851377] ? proc_fail_nth_write+0x9e/0x210 [ 715.855880] ? proc_cwd_link+0x1d0/0x1d0 [ 715.859978] ? __might_fault+0x12b/0x1e0 [ 715.864050] ? lock_release+0xa00/0xa00 [ 715.868035] ? arch_local_save_flags+0x40/0x40 [ 715.872626] ? __lock_is_held+0xb5/0x140 [ 715.876713] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 715.882257] ? _copy_from_user+0xdf/0x150 [ 715.886419] keyctl_dh_compute+0xc5/0x11f [ 715.890580] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 715.895340] ? lockdep_hardirqs_on+0x421/0x5c0 [ 715.899943] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 715.905403] __x64_sys_keyctl+0x17a/0x430 [ 715.909568] do_syscall_64+0x1b9/0x820 [ 715.913461] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 715.918835] ? syscall_return_slowpath+0x5e0/0x5e0 [ 715.923772] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 715.928628] ? trace_hardirqs_on_caller+0x310/0x310 [ 715.933650] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 715.938675] ? prepare_exit_to_usermode+0x291/0x3b0 [ 715.943701] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 715.948565] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.953759] RIP: 0033:0x457ec9 [ 715.957203] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 715.976112] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 715.983828] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 715.991102] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 715.998369] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 [ 716.005642] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 716.012916] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xf000000, 0x0) 18:35:07 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x4b49, &(0x7f0000000080)=""/181) 18:35:07 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x37, 0x0) 18:35:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x52200) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:07 executing program 1 (fault-call:6 fault-nth:7): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:07 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x5451, &(0x7f0000000080)=""/181) [ 716.288944] FAULT_INJECTION: forcing a failure. [ 716.288944] name failslab, interval 1, probability 0, space 0, times 0 [ 716.336456] CPU: 1 PID: 23451 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 716.343525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.352893] Call Trace: [ 716.355511] dump_stack+0x1d3/0x2c6 [ 716.359163] ? dump_stack_print_info.cold.1+0x20/0x20 [ 716.364554] ? graph_lock+0x270/0x270 [ 716.368383] should_fail.cold.4+0xa/0x17 [ 716.372465] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 716.377602] ? crypto_alg_lookup+0x73/0x1d0 [ 716.381952] ? lock_downgrade+0x900/0x900 [ 716.381972] ? find_held_lock+0x36/0x1c0 [ 716.382066] ? aes_ctr_enc_128_avx_by8+0xdd8/0x1250 [ 716.382093] ? ___might_sleep+0x1ed/0x300 [ 716.390299] ? arch_local_save_flags+0x40/0x40 [ 716.390317] ? __crypto_alg_lookup+0x31b/0x390 [ 716.390346] __should_failslab+0x124/0x180 [ 716.390365] should_failslab+0x9/0x14 [ 716.390377] __kmalloc+0x2e4/0x760 [ 716.390392] ? crypto_larval_alloc+0x1d0/0x1d0 [ 716.390408] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 716.390422] ? rcu_pm_notify+0xc0/0xc0 18:35:07 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x97, 0x0) 18:35:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) [ 716.390439] ? crypto_create_tfm+0x87/0x310 [ 716.430412] crypto_create_tfm+0x87/0x310 [ 716.430435] crypto_alloc_tfm+0x1b5/0x2d0 [ 716.430458] crypto_alloc_kpp+0x2c/0x40 [ 716.430478] __keyctl_dh_compute+0x954/0x1bf0 [ 716.430498] ? find_held_lock+0x36/0x1c0 [ 716.438756] ? copy_overflow+0x30/0x30 [ 716.463453] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 716.469009] ? proc_fail_nth_write+0x9e/0x210 [ 716.473527] ? proc_cwd_link+0x1d0/0x1d0 [ 716.477642] ? __might_fault+0x12b/0x1e0 [ 716.481739] ? lock_release+0xa00/0xa00 18:35:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x40) timerfd_settime(r2, 0x1, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000080)) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000000180)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 716.485738] ? arch_local_save_flags+0x40/0x40 [ 716.490336] ? __lock_is_held+0xb5/0x140 [ 716.494421] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 716.499968] ? _copy_from_user+0xdf/0x150 [ 716.504133] keyctl_dh_compute+0xc5/0x11f [ 716.508302] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 716.513071] ? lockdep_hardirqs_on+0x421/0x5c0 [ 716.517669] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 716.517702] __x64_sys_keyctl+0x17a/0x430 [ 716.517725] do_syscall_64+0x1b9/0x820 [ 716.517746] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 716.527339] ? syscall_return_slowpath+0x5e0/0x5e0 [ 716.527357] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 716.527375] ? trace_hardirqs_on_caller+0x310/0x310 [ 716.527393] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 716.527411] ? prepare_exit_to_usermode+0x291/0x3b0 [ 716.561462] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 716.566334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.571531] RIP: 0033:0x457ec9 18:35:07 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) sched_getscheduler(r0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x101842) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x1, {0x2, 0x4}}, 0x14) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 716.574740] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 716.593702] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 716.601428] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 716.608714] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 716.615992] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 [ 716.616002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 18:35:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x10, 0x0) [ 716.616011] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:07 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0xc0045878, &(0x7f0000000080)=""/181) 18:35:07 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1ea, 0x0) 18:35:07 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80086601, &(0x7f0000000080)=""/181) 18:35:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x8, 0x0) 18:35:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000000c0)) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000a00)=ANY=[@ANYBLOB="810000000000000002004e22e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000010000000800000002004e20e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e240000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000096eb8e8a87ff3144e5002be59400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e247f00000100000000000000000000000000000000000000000000000000000000000000000000000000004100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e217f000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x490) 18:35:08 executing program 1 (fault-call:6 fault-nth:8): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40044581, &(0x7f0000000080)=""/181) 18:35:08 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x73, 0x0) 18:35:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xfffffff0, 0x0) 18:35:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x4b47, &(0x7f0000000080)=""/181) 18:35:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x820, 0x280) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x7, 0x2, 0x0, 0xc, 0x3f, 0x2}, 0x20) 18:35:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = gettid() tkill(r2, 0x13) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-aesni-avx2\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) 18:35:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0xc0045878, &(0x7f0000000080)=""/181) 18:35:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x1000000000000000, 0x0) 18:35:08 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xa9, 0x0) 18:35:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0xc0045878, &(0x7f0000000080)=""/181) [ 717.292802] FAULT_INJECTION: forcing a failure. [ 717.292802] name failslab, interval 1, probability 0, space 0, times 0 [ 717.349314] CPU: 1 PID: 23525 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 717.356385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.365755] Call Trace: [ 717.365785] dump_stack+0x1d3/0x2c6 [ 717.365808] ? dump_stack_print_info.cold.1+0x20/0x20 [ 717.365840] should_fail.cold.4+0xa/0x17 [ 717.365862] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 717.365887] ? __save_stack_trace+0x8d/0xf0 [ 717.390770] ? save_stack+0xa9/0xd0 [ 717.394419] ? find_held_lock+0x36/0x1c0 [ 717.398510] ? ___might_sleep+0x1ed/0x300 [ 717.402676] ? arch_local_save_flags+0x40/0x40 [ 717.407281] ? check_preemption_disabled+0x48/0x280 [ 717.412332] __should_failslab+0x124/0x180 [ 717.416592] should_failslab+0x9/0x14 [ 717.420416] kmem_cache_alloc_trace+0x2db/0x750 [ 717.425120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.430683] mpi_alloc+0x4b/0x230 [ 717.434161] mpi_read_raw_data+0x22a/0x490 [ 717.438416] ? memset+0x31/0x40 [ 717.441743] dh_set_secret+0x159/0x4a0 [ 717.445648] ? dh_exit_tfm+0x20/0x20 18:35:08 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x109, 0x0) [ 717.449390] __keyctl_dh_compute+0x9f0/0x1bf0 [ 717.453899] ? find_held_lock+0x36/0x1c0 [ 717.458026] ? copy_overflow+0x30/0x30 [ 717.461945] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 717.467497] ? proc_fail_nth_write+0x9e/0x210 [ 717.472011] ? proc_cwd_link+0x1d0/0x1d0 [ 717.476146] ? __might_fault+0x12b/0x1e0 [ 717.480237] ? lock_release+0xa00/0xa00 [ 717.484227] ? arch_local_save_flags+0x40/0x40 [ 717.484244] ? __lock_is_held+0xb5/0x140 [ 717.484279] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 717.484298] ? _copy_from_user+0xdf/0x150 [ 717.492962] keyctl_dh_compute+0xc5/0x11f [ 717.492980] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 717.492993] ? lockdep_hardirqs_on+0x421/0x5c0 [ 717.493013] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 717.493033] __x64_sys_keyctl+0x17a/0x430 [ 717.493054] do_syscall_64+0x1b9/0x820 [ 717.493073] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 717.493090] ? syscall_return_slowpath+0x5e0/0x5e0 [ 717.493107] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 717.544890] ? trace_hardirqs_on_caller+0x310/0x310 [ 717.549950] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 717.554986] ? prepare_exit_to_usermode+0x291/0x3b0 [ 717.560021] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 717.564892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.570096] RIP: 0033:0x457ec9 [ 717.573303] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 717.592239] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 717.599970] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 717.607246] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 717.614528] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 [ 717.621807] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 717.629089] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:08 executing program 1 (fault-call:6 fault-nth:9): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:08 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x74, 0x0) 18:35:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xf00000000000000, 0x0) 18:35:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = dup2(r0, r0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x800) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) uselib(&(0x7f0000000140)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000200)=""/181) 18:35:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0xc0189436, &(0x7f0000000080)=""/181) 18:35:09 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1b5, 0x0) [ 717.881974] FAULT_INJECTION: forcing a failure. [ 717.881974] name failslab, interval 1, probability 0, space 0, times 0 [ 717.921142] CPU: 1 PID: 23560 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 717.928203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.937570] Call Trace: [ 717.940180] dump_stack+0x1d3/0x2c6 [ 717.943826] ? dump_stack_print_info.cold.1+0x20/0x20 [ 717.949034] ? kernel_text_address+0x79/0xf0 [ 717.953468] should_fail.cold.4+0xa/0x17 [ 717.957549] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 717.962672] ? save_stack+0xa9/0xd0 [ 717.966318] ? save_stack+0x43/0xd0 [ 717.969964] ? kasan_kmalloc+0xcb/0xd0 [ 717.973869] ? mpi_alloc+0x4b/0x230 [ 717.977501] ? mpi_read_raw_data+0x22a/0x490 [ 717.981919] ? dh_set_secret+0x159/0x4a0 [ 717.986002] ? __keyctl_dh_compute+0x9f0/0x1bf0 [ 717.990677] ? keyctl_dh_compute+0xc5/0x11f [ 717.995010] ? __x64_sys_keyctl+0x17a/0x430 [ 717.999338] ? do_syscall_64+0x1b9/0x820 [ 718.003407] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.008784] ? find_held_lock+0x36/0x1c0 [ 718.012872] ? ___might_sleep+0x1ed/0x300 [ 718.017033] ? arch_local_save_flags+0x40/0x40 [ 718.021640] __should_failslab+0x124/0x180 [ 718.025891] should_failslab+0x9/0x14 [ 718.029732] __kmalloc+0x2e4/0x760 [ 718.033284] ? rcu_read_lock_sched_held+0x108/0x120 [ 718.038314] ? kmem_cache_alloc_trace+0x356/0x750 [ 718.043165] ? mpi_alloc_limb_space+0x31/0x50 [ 718.043186] mpi_alloc_limb_space+0x31/0x50 [ 718.043202] mpi_alloc+0x1a0/0x230 [ 718.052021] mpi_read_raw_data+0x22a/0x490 [ 718.052039] ? memset+0x31/0x40 [ 718.052061] dh_set_secret+0x159/0x4a0 [ 718.052079] ? dh_exit_tfm+0x20/0x20 [ 718.052112] __keyctl_dh_compute+0x9f0/0x1bf0 [ 718.052126] ? find_held_lock+0x36/0x1c0 [ 718.052155] ? copy_overflow+0x30/0x30 [ 718.060709] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 718.060728] ? proc_fail_nth_write+0x9e/0x210 [ 718.060744] ? proc_cwd_link+0x1d0/0x1d0 [ 718.060786] ? __might_fault+0x12b/0x1e0 [ 718.067944] ? lock_release+0xa00/0xa00 [ 718.067960] ? arch_local_save_flags+0x40/0x40 [ 718.067975] ? __lock_is_held+0xb5/0x140 [ 718.068008] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 718.120786] ? _copy_from_user+0xdf/0x150 [ 718.124953] keyctl_dh_compute+0xc5/0x11f [ 718.129093] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 718.133846] ? lockdep_hardirqs_on+0x421/0x5c0 [ 718.138446] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 718.143899] __x64_sys_keyctl+0x17a/0x430 [ 718.148042] do_syscall_64+0x1b9/0x820 [ 718.151942] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 718.157304] ? syscall_return_slowpath+0x5e0/0x5e0 [ 718.162234] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 718.167076] ? trace_hardirqs_on_caller+0x310/0x310 [ 718.172097] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 718.177102] ? prepare_exit_to_usermode+0x291/0x3b0 [ 718.182110] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 718.186955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.192128] RIP: 0033:0x457ec9 [ 718.195308] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 718.214200] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 718.221906] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 718.229164] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 718.236423] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 [ 718.243685] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 718.250952] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) poll(&(0x7f0000000340)=[{r1, 0x20}, {r0, 0x8000}, {r0, 0x2}], 0x3, 0x7) r3 = request_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='vmnet0\x00', 0xffffffffffffffff) getresgid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r2, r4) ioctl$TUNSETOWNER(r0, 0x400454cc, r2) 18:35:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xe000000000000000, 0x0) 18:35:11 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000180)={r3, 0x8}) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:11 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1a7, 0x0) 18:35:11 executing program 1 (fault-call:6 fault-nth:10): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80104592, &(0x7f0000000080)=""/181) [ 720.414128] FAULT_INJECTION: forcing a failure. [ 720.414128] name failslab, interval 1, probability 0, space 0, times 0 [ 720.469080] CPU: 0 PID: 23576 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 720.476145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.485502] Call Trace: [ 720.488104] dump_stack+0x1d3/0x2c6 [ 720.491753] ? dump_stack_print_info.cold.1+0x20/0x20 [ 720.496975] ? unwind_get_return_address+0x61/0xa0 [ 720.496995] ? __save_stack_trace+0x8d/0xf0 [ 720.497025] should_fail.cold.4+0xa/0x17 [ 720.510321] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 720.510340] ? save_stack+0xa9/0xd0 [ 720.510359] ? mpi_alloc_limb_space+0x31/0x50 [ 720.510371] ? mpi_alloc+0x1a0/0x230 [ 720.510387] ? mpi_read_raw_data+0x22a/0x490 [ 720.531691] ? dh_set_secret+0x159/0x4a0 [ 720.535762] ? __keyctl_dh_compute+0x9f0/0x1bf0 [ 720.540444] ? keyctl_dh_compute+0xc5/0x11f [ 720.544773] ? __x64_sys_keyctl+0x17a/0x430 [ 720.549111] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.554499] ? do_syscall_64+0x1b9/0x820 [ 720.558587] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.563980] ? find_held_lock+0x36/0x1c0 [ 720.568069] ? ___might_sleep+0x1ed/0x300 [ 720.572231] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 720.577781] ? arch_local_save_flags+0x40/0x40 [ 720.582369] ? rcu_pm_notify+0xc0/0xc0 [ 720.586296] __should_failslab+0x124/0x180 [ 720.590539] should_failslab+0x9/0x14 [ 720.594344] kmem_cache_alloc_trace+0x2db/0x750 [ 720.599024] ? mpi_alloc_limb_space+0x31/0x50 [ 720.603546] mpi_alloc+0x4b/0x230 [ 720.607007] mpi_read_raw_data+0x22a/0x490 [ 720.611259] dh_set_secret+0x25d/0x4a0 [ 720.615157] ? dh_exit_tfm+0x20/0x20 [ 720.618892] __keyctl_dh_compute+0x9f0/0x1bf0 [ 720.623404] ? find_held_lock+0x36/0x1c0 [ 720.627491] ? copy_overflow+0x30/0x30 [ 720.631390] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 720.636967] ? proc_fail_nth_write+0x9e/0x210 [ 720.641481] ? proc_cwd_link+0x1d0/0x1d0 [ 720.645568] ? __might_fault+0x12b/0x1e0 [ 720.649649] ? lock_release+0xa00/0xa00 [ 720.653631] ? arch_local_save_flags+0x40/0x40 [ 720.658243] ? __lock_is_held+0xb5/0x140 [ 720.662343] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 720.667894] ? _copy_from_user+0xdf/0x150 [ 720.672082] keyctl_dh_compute+0xc5/0x11f [ 720.676241] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 720.681045] ? lockdep_hardirqs_on+0x421/0x5c0 [ 720.685639] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 720.691113] __x64_sys_keyctl+0x17a/0x430 [ 720.695274] do_syscall_64+0x1b9/0x820 [ 720.699172] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 720.704557] ? syscall_return_slowpath+0x5e0/0x5e0 [ 720.709500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 720.714347] ? trace_hardirqs_on_caller+0x310/0x310 [ 720.719369] ? prepare_exit_to_usermode+0x291/0x3b0 [ 720.724402] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 720.729267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.734464] RIP: 0033:0x457ec9 [ 720.737668] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 720.756592] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa 18:35:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xa803000000000000, 0x0) 18:35:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xe000, 0x0) 18:35:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x3a8, 0x0) 18:35:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x300) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0)=[{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000180)="669bf51d4ad6440d4725c95ac19dce72b327a967bee1d0de18e20ab52c75634f3a5184ab1e0ebc0886be4b65da99f315a67b3241546e1a977c2900425f8017bfc283ce5dc100c5fd1528c886e35bff2c5993e8b1c00132f2d81346860fe59743433bb5e55dcc3772cacab5491d3d0666e30bddbddb0168a37157a8a4b6ed82b51cf663a077efbd407a10eddcb6a320", 0x8f}, {&(0x7f0000000080)="b75eb769de", 0x5}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="f2ad19552e30a7ca1981a77ebfc524817e87d3827d37624eac4a777f24a571d6bb03cd9980442967129d870d50d912ae6e8cf70469effce060ea386401e6fb591f1a13259dac2c3e958980d59b1a0cef4cafd2cdfdc135f34c4799c5e926280619f47dfcc605f84c41642dd404c8324e0405fe22b02bdc6ff7b37c72b549668303bce69d1afaf98757804b74575c78b06fde533e6d28539419ac20792946d2b9d3dfda3431f30740a084067337edd87093490cfae4072174bf7f0cbd", 0xbc}, {&(0x7f0000001300)="da9b79dad230036f74c51a13bdd99694f69d1b517834b59d82eccd449fb1354424a3f799545728268dbbbb3efbea967641b4f9c5d8beaeb413be64a444bb8713805da4f8f64df8d318d6e6c6f3ec3d4c7c9c702f816f637cdd4f7ddb6aceb9e7a6fb21a03a786fb26cae53602580a61b9548e60f38b920dccf19063ea9d143636cb5cdbd8ca39b92a369924967c5ec3004dcec53b5879201f57e8102c1a57e3619547f239ac84a166b854761918a980566598e4a9c58c291f2e03595b4355361b47dfdb488870032835d3aad", 0xcc}, {&(0x7f0000001400)="b4e2c67b11220ddeab9a4cb5e105d66224e76a30385f2907ee68140d21348c2a53f4032659eb9791b3c1ea68edff14ebda22b3511b1ec497bb0942e0f2d49719bcf460ff7c8ee73674afbad1ab8a99f5845e021e4ab9c1e4b58d85ea34254d35235ef60032b7a02a477457e0e1e779c8024110c18ce38bba67b380a7c88aae44b2d50b05ef9c4959be7f831481c60eb989cc8acb81d45adb3abb647ae0abfc5e2795033d8dfd7382d9d00562121683e85ca59e24d71c6520220382c221", 0xbd}], 0x6, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], 0x218, 0x4800}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:11 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1c9, 0x0) 18:35:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xffffff8d, 0x0) [ 720.764310] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 720.771586] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 720.778863] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 [ 720.786146] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 720.793427] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:12 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000500)=""/181) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x100000001, 0x6, &(0x7f00000003c0)=[{&(0x7f00000000c0)="a06f56e928e76c3bf995fd03d85de145244bad3edf739445691dccc800f1b2e22917c32ee690bfe7193e829ae339b6765af49171fcc193eda6a2be6c7a0fee41aa8f7df34228f11fbbe6b050c5c1d1eb2fff4453249b9ac4bc0e310d2ad460740b29417827c8c2f0c782a709a30b7ea1e356232d510947982804dc1d654a5ceaaff7a8e6147f18d281a4149869bb12b060e579f2051a48e1c1c1590c3b26aae26689c2f88cf457ee505f8d4a5866218101376d05599e6a86ea43dc21f6dd8dfa00495ad86f09664cffbebf1919536b04ad2c16648c824a57b4", 0xd9, 0x100}, {&(0x7f0000000200)="e8fc", 0x2, 0xffff}, {&(0x7f0000000240)="ca7fe2eb731a97683e3cf59a2e495237048d351fbf461f572a64e3fa3f3d5b27f20dc8ac14e5a01de2d4cb22f85c3db4ccf0337bce1aa5aadba50af6431ce158d21162b855a02b4351cf3788714965cadf3a7f4d8366001946aea7ec8f585d14d2d2a013a48d239cb5ceee29a57f4b64c4a0143a7fee99aeea083a8f701e7df9a93850b3fbe40efd86316d1554ec08855a", 0x91, 0x400}, {&(0x7f0000000300), 0x0, 0xff}, {&(0x7f0000000340)="3d12a2d65111900b35826b3897638880f681eafc4c084a36ecc9d4fca3f3924eb3a8a4038b33d2e208a57534fdff6b6807694bbb131d803da023", 0x3a, 0x1000}, {&(0x7f0000000380)="d6715e6cfa7f9338a2a09683f82c4f4ed05fdb103f204b6562", 0x19, 0x7}], 0x40000, &(0x7f0000000640)={[{@uni_xlate='uni_xlate=1'}, {@fat=@quiet='quiet'}, {@fat=@sys_immutable='sys_immutable'}, {@utf8='utf8=1'}], [{@appraise_type='appraise_type=imasig'}, {@dont_appraise='dont_appraise'}, {@uid_lt={'uid<', r2}}, {@audit='audit'}]}) 18:35:12 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40104593, &(0x7f0000000080)=""/181) 18:35:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000001580)=0x40, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = shmget$private(0x0, 0x2000, 0xc60, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000540)=""/4096) r3 = syz_open_dev$radio(&(0x7f00000015c0)='/dev/radio#\x00', 0x0, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f00000016c0)={0x1, &(0x7f0000001600)=[{}]}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000340)={0x0, 0x0, 0x9, 0x5, 0x8, 0x2, 0xc67, 0xfff, {0x0, @in6={{0xa, 0x4e24, 0x100000001, @empty, 0x6}}, 0x7fffffff, 0x9, 0x1, 0x81, 0x6}}, &(0x7f0000000400)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000440)=r5, 0x4) r6 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r6, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000480)={r4, 0x0, 0x5, 0xfffffffffffffff8}, 0x10) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000001700)) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1, 0x0, 0xffffffffffffff7e}}], 0x1, 0x0, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f00000000c0)={0x3, &(0x7f0000000180)=[{}, {}, {}]}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r8, 0x2284, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xd00, 0x0) 18:35:12 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x156, 0x0) 18:35:12 executing program 1 (fault-call:6 fault-nth:11): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xf0ffffff, 0x0) 18:35:12 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e22,rq=0x0000000000390080,timeout=0x0000000000008000,sq=0x0000000000000008,sq=0x0000000000000006,rq=0x0000000000000030,pcr=00000000000000000049,uid>', @ANYRESDEC=r1, @ANYBLOB=',euid>', @ANYRESDEC=r2, @ANYBLOB="2c646f6e745f6d6561737572652c6d61736b3d4d4159a03f82d31d52fdbb392a4adf74c7644c334c83b53ee69466700bccc406e6333d64c8a28d5c35deaa9bd677fb941bddebc5f9c63f12fd71d6e92029e06fdfe1e8fdb87fde454ffb3f8b67061406815fb7a10f9f873a9e52d319b5b805dc1642138cdaf39aa41e662f1077a23e62cda1f0d057d55900846cc31ac55dfe2f028fc1c5217ce63ff29fedc720013b8e66234e163eb988b2d3f74bfd652f12e0de73232ec481e762a82b7baad918571caf9d32acb5e86bf95244ef80f219171b05613f3f773f80c7237479bf5a34e264688f"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() r5 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x3, 0x101000) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x72, 0x6, 0x5, 0xf4cd, 0x0, 0x180, 0x101, 0x1, 0x658a, 0xf42, 0x8, 0x1, 0x5, 0x200, 0x1, 0x5, 0xfffffffffffffffb, 0x3c, 0xd2, 0x100, 0x1e6, 0xfffffffffffffe01, 0x2, 0x6, 0x3524a8a3, 0xffffffffffffff93, 0x7, 0x4, 0xffff, 0x6, 0x7, 0x8, 0x3, 0x79e4c0b6, 0x711ba0f4, 0x1, 0x0, 0x3, 0x3, @perf_config_ext={0x6, 0x1}, 0x100, 0xc264, 0x0, 0x8, 0xfff, 0x7, 0x6}, r4, 0xa, r5, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = dup3(r1, r1, 0x80000) write$eventfd(r2, &(0x7f0000000000)=0x1, 0x8) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:12 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80044584, &(0x7f0000000080)=""/181) [ 721.315869] FAULT_INJECTION: forcing a failure. [ 721.315869] name failslab, interval 1, probability 0, space 0, times 0 [ 721.398325] CPU: 1 PID: 23641 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 721.405387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.414741] Call Trace: [ 721.417352] dump_stack+0x1d3/0x2c6 [ 721.421014] ? dump_stack_print_info.cold.1+0x20/0x20 [ 721.426223] ? kernel_text_address+0x79/0xf0 [ 721.430654] should_fail.cold.4+0xa/0x17 [ 721.434746] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 721.439872] ? save_stack+0xa9/0xd0 [ 721.443509] ? save_stack+0x43/0xd0 18:35:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xa803, 0x0) 18:35:12 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xc1, 0x0) [ 721.447140] ? kasan_kmalloc+0xcb/0xd0 [ 721.451031] ? mpi_alloc+0x4b/0x230 [ 721.454662] ? mpi_read_raw_data+0x22a/0x490 [ 721.459086] ? dh_set_secret+0x25d/0x4a0 [ 721.463156] ? __keyctl_dh_compute+0x9f0/0x1bf0 [ 721.467832] ? keyctl_dh_compute+0xc5/0x11f [ 721.467848] ? __x64_sys_keyctl+0x17a/0x430 [ 721.467865] ? do_syscall_64+0x1b9/0x820 [ 721.467886] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.485945] ? find_held_lock+0x36/0x1c0 [ 721.485985] ? ___might_sleep+0x1ed/0x300 [ 721.494182] ? arch_local_save_flags+0x40/0x40 [ 721.498784] __should_failslab+0x124/0x180 [ 721.503034] should_failslab+0x9/0x14 [ 721.506843] __kmalloc+0x2e4/0x760 [ 721.510391] ? rcu_read_lock_sched_held+0x108/0x120 [ 721.515417] ? kmem_cache_alloc_trace+0x356/0x750 [ 721.520266] ? mpi_alloc_limb_space+0x31/0x50 [ 721.520287] mpi_alloc_limb_space+0x31/0x50 [ 721.520302] mpi_alloc+0x1a0/0x230 [ 721.520319] mpi_read_raw_data+0x22a/0x490 [ 721.520346] dh_set_secret+0x25d/0x4a0 [ 721.520364] ? dh_exit_tfm+0x20/0x20 [ 721.520400] __keyctl_dh_compute+0x9f0/0x1bf0 [ 721.520416] ? find_held_lock+0x36/0x1c0 [ 721.537001] ? copy_overflow+0x30/0x30 [ 721.537022] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 721.562555] ? proc_fail_nth_write+0x9e/0x210 [ 721.567062] ? proc_cwd_link+0x1d0/0x1d0 [ 721.571153] ? __might_fault+0x12b/0x1e0 [ 721.575239] ? lock_release+0xa00/0xa00 [ 721.579397] ? arch_local_save_flags+0x40/0x40 [ 721.583989] ? __lock_is_held+0xb5/0x140 [ 721.588089] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 721.593640] ? _copy_from_user+0xdf/0x150 18:35:12 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x14b, 0x0) [ 721.597811] keyctl_dh_compute+0xc5/0x11f [ 721.601969] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 721.606736] ? lockdep_hardirqs_on+0x421/0x5c0 [ 721.611337] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 721.616812] __x64_sys_keyctl+0x17a/0x430 [ 721.620978] do_syscall_64+0x1b9/0x820 [ 721.624872] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 721.630240] ? syscall_return_slowpath+0x5e0/0x5e0 [ 721.630256] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 721.630272] ? trace_hardirqs_on_caller+0x310/0x310 [ 721.630289] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 721.630312] ? prepare_exit_to_usermode+0x291/0x3b0 [ 721.630334] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 721.630357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.665161] RIP: 0033:0x457ec9 [ 721.668363] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 721.687274] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa 18:35:12 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x200) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 721.694991] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 721.702277] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 721.709549] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 [ 721.716839] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 721.724111] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:12 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)={0x0, 0xff}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x1a}, 0x7ff}}, 0x3f, 0x8, 0x5, 0x7ad25cc1, 0x59}, 0x98) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xe0, 0x0) 18:35:13 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1d6, 0x0) 18:35:13 executing program 1 (fault-call:6 fault-nth:12): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x420200, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) accept(r0, &(0x7f0000000080)=@l2, &(0x7f00000002c0)=0x80) write$P9_RLERRORu(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="0720002d2947eb"], 0x7) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@noextend='noextend'}]}}) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000180)={0x2, 0x4, 0x80000001, 0x0, 0x0, [], [], [], 0x1, 0x6}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000400)) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000340)=""/170) r4 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r4, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000300)) 18:35:13 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x4b47, &(0x7f0000000080)=""/181) 18:35:13 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x0, 0x200000) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f0000000200)={0x9, 0x6, 0x9, 0x2}) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, &(0x7f0000000280)={0xf, {0x100000000, 0x5, 0x7fffffff, 0xffff}}) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) mkdir(&(0x7f0000000240)='./file0\x00', 0x39) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xc100, 0x0) faccessat(r3, &(0x7f0000000140)='./file0\x00', 0x2, 0x400) 18:35:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x800000000000000, 0x0) 18:35:13 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x2c, 0x0) 18:35:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x8dffffff00000000, 0x0) 18:35:13 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x995c, 0x204000) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000140)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:13 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x5452, &(0x7f0000000080)=""/181) 18:35:13 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400000, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000180)={0x2, {{0xa, 0x4e22, 0x5, @empty, 0x8}}, {{0xa, 0x4e23, 0x5, @local, 0x6}}}, 0x108) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 722.356081] FAULT_INJECTION: forcing a failure. [ 722.356081] name failslab, interval 1, probability 0, space 0, times 0 [ 722.367692] CPU: 0 PID: 23707 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 722.374720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.384082] Call Trace: [ 722.386686] dump_stack+0x1d3/0x2c6 [ 722.390347] ? dump_stack_print_info.cold.1+0x20/0x20 [ 722.395568] ? unwind_get_return_address+0x61/0xa0 [ 722.400535] ? __save_stack_trace+0x8d/0xf0 [ 722.404880] should_fail.cold.4+0xa/0x17 [ 722.408964] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 722.414080] ? save_stack+0xa9/0xd0 [ 722.417718] ? mpi_alloc_limb_space+0x31/0x50 [ 722.422223] ? mpi_alloc+0x1a0/0x230 [ 722.425952] ? mpi_read_raw_data+0x22a/0x490 [ 722.430388] ? dh_set_secret+0x25d/0x4a0 [ 722.434469] ? __keyctl_dh_compute+0x9f0/0x1bf0 [ 722.439145] ? keyctl_dh_compute+0xc5/0x11f [ 722.443472] ? __x64_sys_keyctl+0x17a/0x430 [ 722.447804] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.453185] ? do_syscall_64+0x1b9/0x820 [ 722.457266] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.462647] ? find_held_lock+0x36/0x1c0 [ 722.466744] ? ___might_sleep+0x1ed/0x300 [ 722.470903] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 722.476458] ? arch_local_save_flags+0x40/0x40 [ 722.481043] ? rcu_pm_notify+0xc0/0xc0 [ 722.484963] __should_failslab+0x124/0x180 [ 722.489213] should_failslab+0x9/0x14 [ 722.493022] kmem_cache_alloc_trace+0x2db/0x750 [ 722.497700] ? mpi_alloc_limb_space+0x31/0x50 [ 722.502229] mpi_alloc+0x4b/0x230 [ 722.505694] mpi_read_raw_data+0x22a/0x490 [ 722.509954] dh_set_secret+0x2da/0x4a0 [ 722.513855] ? dh_exit_tfm+0x20/0x20 [ 722.517595] __keyctl_dh_compute+0x9f0/0x1bf0 [ 722.522098] ? find_held_lock+0x36/0x1c0 [ 722.526202] ? copy_overflow+0x30/0x30 [ 722.530107] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 722.535661] ? proc_fail_nth_write+0x9e/0x210 [ 722.540166] ? proc_cwd_link+0x1d0/0x1d0 [ 722.544270] ? __might_fault+0x12b/0x1e0 [ 722.548354] ? lock_release+0xa00/0xa00 [ 722.552343] ? arch_local_save_flags+0x40/0x40 [ 722.556949] ? __lock_is_held+0xb5/0x140 [ 722.561036] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 722.566584] ? _copy_from_user+0xdf/0x150 [ 722.570744] keyctl_dh_compute+0xc5/0x11f [ 722.574908] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 722.579685] ? lockdep_hardirqs_on+0x421/0x5c0 [ 722.584284] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 722.589752] __x64_sys_keyctl+0x17a/0x430 [ 722.593934] do_syscall_64+0x1b9/0x820 [ 722.597828] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 722.603210] ? syscall_return_slowpath+0x5e0/0x5e0 [ 722.608157] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 722.613020] ? trace_hardirqs_on_caller+0x310/0x310 [ 722.618065] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 722.623105] ? prepare_exit_to_usermode+0x291/0x3b0 [ 722.628145] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 722.633052] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.638254] RIP: 0033:0x457ec9 18:35:13 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x6, 0x0) 18:35:13 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1f8, 0x0) [ 722.641455] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 722.660364] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 722.668088] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 722.675365] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 722.682650] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 [ 722.689935] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 722.697562] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:13 executing program 1 (fault-call:6 fault-nth:13): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xf0ffffff00000000, 0x0) 18:35:13 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x2, 0x0, [0xe23c, 0x0, 0x360d5a5a, 0x0, 0xc51, 0x400, 0x100000000, 0x1000]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), &(0x7f0000000280)=0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000380)=""/181) mknodat(r2, &(0x7f0000000200)='./file0\x00', 0x200, 0x9) 18:35:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000040)=0x2) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x6, 0x4) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:13 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x4020940d, &(0x7f0000000080)=""/181) 18:35:13 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x10, 0x0) 18:35:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x60c000, 0x0) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000040)) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:14 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = msgget$private(0x0, 0xa9) msgctl$IPC_RMID(r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) [ 723.017239] FAULT_INJECTION: forcing a failure. [ 723.017239] name failslab, interval 1, probability 0, space 0, times 0 [ 723.044335] CPU: 1 PID: 23741 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 723.051389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.060931] Call Trace: [ 723.060958] dump_stack+0x1d3/0x2c6 [ 723.060983] ? dump_stack_print_info.cold.1+0x20/0x20 [ 723.061010] ? kernel_text_address+0x79/0xf0 [ 723.076801] should_fail.cold.4+0xa/0x17 [ 723.080879] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 723.085997] ? save_stack+0xa9/0xd0 [ 723.089633] ? save_stack+0x43/0xd0 [ 723.093269] ? kasan_kmalloc+0xcb/0xd0 [ 723.097161] ? mpi_alloc+0x4b/0x230 [ 723.100788] ? mpi_read_raw_data+0x22a/0x490 [ 723.105210] ? dh_set_secret+0x2da/0x4a0 [ 723.109279] ? __keyctl_dh_compute+0x9f0/0x1bf0 18:35:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x8000000, 0x0) [ 723.109295] ? keyctl_dh_compute+0xc5/0x11f [ 723.109310] ? __x64_sys_keyctl+0x17a/0x430 [ 723.109329] ? do_syscall_64+0x1b9/0x820 [ 723.126671] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.132052] ? find_held_lock+0x36/0x1c0 [ 723.136140] ? ___might_sleep+0x1ed/0x300 [ 723.140300] ? arch_local_save_flags+0x40/0x40 [ 723.144907] __should_failslab+0x124/0x180 [ 723.149165] should_failslab+0x9/0x14 [ 723.152971] __kmalloc+0x2e4/0x760 [ 723.156518] ? rcu_read_lock_sched_held+0x108/0x120 [ 723.161541] ? kmem_cache_alloc_trace+0x356/0x750 [ 723.166394] ? mpi_alloc_limb_space+0x31/0x50 [ 723.166416] mpi_alloc_limb_space+0x31/0x50 [ 723.166431] mpi_alloc+0x1a0/0x230 [ 723.166448] mpi_read_raw_data+0x22a/0x490 [ 723.166472] dh_set_secret+0x2da/0x4a0 [ 723.186911] ? dh_exit_tfm+0x20/0x20 [ 723.190660] __keyctl_dh_compute+0x9f0/0x1bf0 [ 723.195166] ? find_held_lock+0x36/0x1c0 [ 723.199254] ? copy_overflow+0x30/0x30 [ 723.203152] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 723.208704] ? proc_fail_nth_write+0x9e/0x210 [ 723.213210] ? proc_cwd_link+0x1d0/0x1d0 [ 723.217304] ? __might_fault+0x12b/0x1e0 [ 723.221380] ? lock_release+0xa00/0xa00 [ 723.221397] ? arch_local_save_flags+0x40/0x40 [ 723.221413] ? __lock_is_held+0xb5/0x140 [ 723.221447] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 723.221466] ? _copy_from_user+0xdf/0x150 [ 723.239620] keyctl_dh_compute+0xc5/0x11f [ 723.239639] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 723.239655] ? lockdep_hardirqs_on+0x421/0x5c0 [ 723.239678] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 723.239707] __x64_sys_keyctl+0x17a/0x430 18:35:14 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x134, 0x0) [ 723.239729] do_syscall_64+0x1b9/0x820 [ 723.270772] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 723.276157] ? syscall_return_slowpath+0x5e0/0x5e0 [ 723.281096] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 723.285963] ? trace_hardirqs_on_caller+0x310/0x310 [ 723.290997] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 723.296029] ? prepare_exit_to_usermode+0x291/0x3b0 [ 723.301064] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 723.305938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.311141] RIP: 0033:0x457ec9 [ 723.314341] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 723.333246] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 723.333263] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 723.333272] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 723.333281] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 [ 723.333290] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 723.333300] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:14 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_mount_image$nfs4(&(0x7f0000000140)='nfs4\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x2, &(0x7f0000000340)=[{&(0x7f00000001c0)="aa650f58e9ded1dfce0eb23f2c20f7a04bc3a2015099cb4ba6c4abafd16d56c28af6e8036d3953459a158e532f998fe7683cbe5adc283bdc3bac0a4b3c177be20a8d8725ec6b86fa5c4d1f69e1109855c17268b6d32124602011bdf4f4a67506540af069176f7347252ac0610a22a2c35d29a5d35522cf041b8dd598950876d2a0308599aa8a7c1262591f94292833fc67b1e405f61245f3b8bb75dc2a875f2b30a46b61485255ffac58ffa75973a5625ae431be17ecd81bbaec2d", 0xbb, 0x5}, {&(0x7f0000000280)="0daf4f02bd8e36af4e943fd7f09750d2eeb6d43cd0bf54335f64b6659cdcfd8d679128c8c12796edd513b50a0b2e8d378fb09aee22a3de5c969e4ac98ad079bc034676106a96364297b50bb2cc7af3a2e3ab4c677855afc2df8f808de5a9750cb45f36dc2fcb01ebd6e69fe745e1e41c1cd36aafdc415a89c119e3187c7130fe6d6e27f7f77ce2a438b163b49d38", 0x8e}], 0x0, &(0x7f0000000380)='@\x00') openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x700, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f00000003c0)=""/243) setxattr$security_smack_transmute(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000580)=""/4096) 18:35:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x8dffffff, 0x0) 18:35:14 executing program 1 (fault-call:6 fault-nth:14): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:14 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x80) timerfd_create(0x1, 0x800) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x3af, 0x5, 0x3, 0x5fd7, 0x2, 0xfffffffffffffffb, 0xb5f, {0x0, @in6={{0xa, 0x4e22, 0xe5, @mcast1, 0x6bb}}, 0x3, 0x6, 0xfffffffffffffffa, 0x7, 0x80000000}}, &(0x7f0000000080)=0xb0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r2, 0x6, 0x20, 0x1}, &(0x7f0000000240)=0x10) r3 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/181) 18:35:14 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x131, 0x0) 18:35:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xf00, 0x0) 18:35:14 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xd4c, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) [ 723.770523] FAULT_INJECTION: forcing a failure. [ 723.770523] name failslab, interval 1, probability 0, space 0, times 0 [ 723.860222] CPU: 0 PID: 23775 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 723.867284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.876641] Call Trace: [ 723.879258] dump_stack+0x1d3/0x2c6 [ 723.882909] ? dump_stack_print_info.cold.1+0x20/0x20 [ 723.888121] ? do_syscall_64+0x1b9/0x820 [ 723.892193] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.897590] should_fail.cold.4+0xa/0x17 [ 723.901674] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 723.906797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.912349] ? rcu_pm_notify+0xc0/0xc0 [ 723.916248] ? find_held_lock+0x36/0x1c0 [ 723.920336] ? ___might_sleep+0x1ed/0x300 [ 723.924500] ? arch_local_save_flags+0x40/0x40 [ 723.929094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.934643] ? mpi_read_raw_data+0x19f/0x490 [ 723.939075] __should_failslab+0x124/0x180 [ 723.943317] should_failslab+0x9/0x14 [ 723.947120] __kmalloc+0x2e4/0x760 [ 723.950673] ? __keyctl_dh_compute+0xaba/0x1bf0 [ 723.950696] __keyctl_dh_compute+0xaba/0x1bf0 18:35:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xf, 0x0) 18:35:15 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x4a, 0x0) 18:35:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000400)=""/13) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r3 = accept(r0, &(0x7f0000000000)=@ethernet={0x0, @random}, &(0x7f0000000080)=0x80) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x80200, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x1e) connect$l2tp(r3, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @local}, 0x0, 0x2, 0x0, 0x1}}, 0x26) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f00000001c0)={r4, 0x4}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000002c0)={r6, 0x68, &(0x7f0000000240)=[@in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e23, 0x8000, @empty, 0x400}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e21, 0x7fffffff, @loopback, 0xfffffffffffffff8}]}, &(0x7f0000000300)=0x10) [ 723.950712] ? find_held_lock+0x36/0x1c0 [ 723.950744] ? copy_overflow+0x30/0x30 [ 723.950765] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 723.950779] ? proc_fail_nth_write+0x9e/0x210 [ 723.950792] ? proc_cwd_link+0x1d0/0x1d0 [ 723.950824] ? __might_fault+0x12b/0x1e0 [ 723.960186] ? lock_release+0xa00/0xa00 [ 723.960210] ? arch_local_save_flags+0x40/0x40 [ 723.960226] ? __lock_is_held+0xb5/0x140 [ 723.960257] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 723.960273] ? _copy_from_user+0xdf/0x150 [ 723.960295] keyctl_dh_compute+0xc5/0x11f [ 723.960312] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 724.017392] ? lockdep_hardirqs_on+0x421/0x5c0 [ 724.021969] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 724.027408] __x64_sys_keyctl+0x17a/0x430 [ 724.031549] do_syscall_64+0x1b9/0x820 [ 724.035425] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 724.040779] ? syscall_return_slowpath+0x5e0/0x5e0 [ 724.045692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 724.050523] ? trace_hardirqs_on_caller+0x310/0x310 [ 724.055527] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 724.060530] ? prepare_exit_to_usermode+0x291/0x3b0 [ 724.065537] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 724.070373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.075546] RIP: 0033:0x457ec9 [ 724.078725] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 724.097793] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa 18:35:15 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20000, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140)=0x52b, 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setxattr$trusted_overlay_nlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'L-', 0x9}, 0x28, 0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) mbind(&(0x7f000066f000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000300)=0x1000, 0x100, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x8, 0x3}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={r3, 0x7ff, 0x6, [0x5, 0x40, 0x7, 0x6, 0x800, 0x1]}, 0x14) ioctl$EVIOCGKEYCODE(r1, 0x80084503, &(0x7f0000000080)=""/181) [ 724.105485] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 724.112765] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 724.120047] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 [ 724.127298] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 724.134553] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:15 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x40084503, &(0x7f0000000000)=""/181) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001100)='/dev/dlm-control\x00', 0x9c440, 0x0) sendmsg$nl_generic(r0, &(0x7f0000001300)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x2008010}, 0xc, &(0x7f00000012c0)={&(0x7f0000001180)={0x134, 0x19, 0x504, 0x70bd2a, 0x25dfdbfd, {0x18}, [@typed={0x18, 0x2f, @str='vboxnet1Lcpuset#\x00'}, @generic="22dcc2018e6ecfa6650031bba320986b0fbbc25f5309c8be62dd4b678c08a331237f997bed349150eaf9f60570479d8080b3dfbacb57eb0e1790d124e44f237084ec806f8e3a3be7c3c417becf0e605f1e387f0456e658849746f18169ef7a769b824d764861a40e3b", @generic="e933b920773ff865be7d00fe93e7113008d7e36e0c4c51f641221398a26bc2efbcdf7cbbc01c1951eaff95aa60169a3881222f255d399567c9cdf16303e839f85e38b624f4bde43e5748b395b0c362f700e4534cff9f9e7c04c05ed342f4f495198fbc9a4f9835bff8c0e996679b52cd9034e0", @generic="25075d0a8c13412e00d080ccd7edbd588cced222cf753e62536a8cc68a76cbdc124a0b5ac57c7825b5b5543f"]}, 0x134}, 0x1, 0x0, 0x0, 0x1}, 0x40) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000001340), &(0x7f0000001380)=0x4) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3, 0x249c0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000100)=""/4096) 18:35:15 executing program 1 (fault-call:6 fault-nth:15): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xffffffff00000000, 0x0) 18:35:15 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x59, 0x0) 18:35:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2, &(0x7f0000000280)=[{&(0x7f0000000180)="61c2abd40012830904e786d84bd6d44aa56491c5cd4bb800aa0589a0b3fcbf5e8c651f3dc2440e4ae3074efc75ffd65de1b6198fad6958f9e157f7f1c4b214f3492cc6b452178fe9c186602e59fbc7240a0ab266dc7fcb3638f1707d161dd872ee93dcaf2278daf361930893127aa91f41178c80a9b196673c608289ae52909f2de7797098c5d4d96110ca294bbe166fe23fdfbdbb003510573bc1b643431fead9aa4d5080cbf0a4805e684a80d72ededb46da4bef5bf049e1c9aaf157bae14712adea0e98a6fa41d16e3af8391d090deb48e271e9fd34f1b5062c4f9b4538de68dc717fd0e4f91b64d3", 0xea, 0x5}, {&(0x7f0000000080)="145bba132812030bb44cd6f517a9593a824c6a5753e9312f7775efdd013ea7c92d06ea5e8af19c3abb17e7fc05ccf92f79e8514821e2752d89a22a19b8007a9c437822ef93eabebe5d955c54417ffb8f6f956302e7dbbed2b27f7e2d7e8724ff32fe6ba34c769e82a8720e5ebbcaad16116f", 0x72, 0x100000000}], 0x800, &(0x7f00000002c0)={[{@tails_on='tails=on'}, {@nolargeio='nolargeio'}, {@nolargeio='nolargeio'}, {@jdev={'jdev', 0x3d, './file0'}}, {@hash_tea='hash=tea'}, {@replayonly='replayonly'}, {@resize={'resize', 0x3d, 0x8}}, {@resize_auto='resize=auto'}, {@nouser_xattr='nouser_xattr'}], [{@obj_user={'obj_user', 0x3d, 'trustedself,$ppp0md5sum*systemvmnet0'}}, {@obj_user={'obj_user', 0x3d, 'mime_type'}}, {@context={'context', 0x3d, 'system_u'}}, {@smackfshat={'smackfshat', 0x3d, 'skcipher\x00'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@audit='audit'}]}) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:15 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x2000000005, 0x40000) r1 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x64e3, 0x40000) inotify_add_watch(r1, &(0x7f00000001c0)='./file0\x00', 0x8) mmap(&(0x7f0000548000/0x2000)=nil, 0x2000, 0x3000003, 0x20010, 0xffffffffffffffff, 0x4000) r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000440)=[@in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0x3f, @mcast2, 0xd0}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x27}}, @in6={0xa, 0x4e24, 0x4, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e21, @empty}], 0x88) r3 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r3, 0x40084503, &(0x7f0000000240)=""/181) connect$inet(r3, &(0x7f0000000080)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) 18:35:15 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffbfffffffc, 0x0) socketpair$unix(0x1, 0x9, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x20113, r2, 0x100000000003) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000080)=""/122) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) r3 = fcntl$getown(r1, 0x9) migrate_pages(r3, 0x9, &(0x7f0000000100)=0x200, &(0x7f0000000140)=0x1) [ 724.525388] FAULT_INJECTION: forcing a failure. [ 724.525388] name failslab, interval 1, probability 0, space 0, times 0 18:35:15 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1c3, 0x0) [ 724.621253] CPU: 0 PID: 23825 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 724.628332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.637697] Call Trace: [ 724.640302] dump_stack+0x1d3/0x2c6 [ 724.643965] ? dump_stack_print_info.cold.1+0x20/0x20 [ 724.649177] ? __kernel_text_address+0xd/0x40 [ 724.653697] ? unwind_get_return_address+0x61/0xa0 [ 724.658651] should_fail.cold.4+0xa/0x17 [ 724.662731] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 724.667853] ? save_stack+0x43/0xd0 [ 724.667869] ? kasan_kmalloc+0xcb/0xd0 [ 724.667882] ? __kmalloc+0x15d/0x760 [ 724.667905] ? __keyctl_dh_compute+0xaba/0x1bf0 [ 724.667932] ? keyctl_dh_compute+0xc5/0x11f [ 724.675439] ? __x64_sys_keyctl+0x17a/0x430 [ 724.675460] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.675477] ? rcu_pm_notify+0xc0/0xc0 [ 724.675503] ? find_held_lock+0x36/0x1c0 [ 724.705796] ? ___might_sleep+0x1ed/0x300 [ 724.709970] ? arch_local_save_flags+0x40/0x40 [ 724.714567] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 724.720132] __should_failslab+0x124/0x180 [ 724.724381] should_failslab+0x9/0x14 [ 724.728186] __kmalloc+0x2e4/0x760 [ 724.731753] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.737304] ? __phys_addr+0xa6/0x120 [ 724.741118] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.746664] ? __keyctl_dh_compute+0xb52/0x1bf0 [ 724.751398] ? sg_init_one+0xb7/0x150 [ 724.755231] __keyctl_dh_compute+0xb52/0x1bf0 [ 724.759741] ? find_held_lock+0x36/0x1c0 [ 724.763823] ? copy_overflow+0x30/0x30 18:35:15 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x18, 0x0) [ 724.767726] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 724.773277] ? proc_fail_nth_write+0x9e/0x210 [ 724.777780] ? proc_cwd_link+0x1d0/0x1d0 [ 724.781870] ? __might_fault+0x12b/0x1e0 [ 724.785958] ? lock_release+0xa00/0xa00 [ 724.789949] ? arch_local_save_flags+0x40/0x40 [ 724.794540] ? __lock_is_held+0xb5/0x140 [ 724.798633] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.804185] ? _copy_from_user+0xdf/0x150 [ 724.808351] keyctl_dh_compute+0xc5/0x11f [ 724.812520] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 724.817297] ? lockdep_hardirqs_on+0x421/0x5c0 [ 724.821899] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 724.827377] __x64_sys_keyctl+0x17a/0x430 [ 724.831542] do_syscall_64+0x1b9/0x820 [ 724.835442] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 724.840828] ? syscall_return_slowpath+0x5e0/0x5e0 [ 724.845766] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 724.850629] ? trace_hardirqs_on_caller+0x310/0x310 [ 724.855656] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 724.860773] ? prepare_exit_to_usermode+0x291/0x3b0 [ 724.865806] ? trace_hardirqs_off_thunk+0x1a/0x1c 18:35:16 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x116, 0x0) [ 724.870671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.875875] RIP: 0033:0x457ec9 [ 724.879076] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 724.897982] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 724.905702] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 724.905712] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 18:35:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xe0000000, 0x0) [ 724.905720] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 [ 724.905729] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 724.905738] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 [ 724.932949] REISERFS warning (device loop3): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 724.932949] 18:35:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000000)={'hsr0\x00', {0x2, 0x4e21, @multicast2}}) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:16 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0x1, @empty, 0x5}}, [0x1, 0x3, 0xb02, 0x4, 0x2, 0x2, 0x9, 0x5, 0x8, 0x200, 0x8, 0x400, 0x1000, 0x80000001, 0x743]}, &(0x7f0000000240)=0x100) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000280)={r1, 0x9}, 0x8) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) fcntl$addseals(r0, 0x409, 0x2) ioctl$EVIOCGKEYCODE(r2, 0x40084503, &(0x7f0000000080)=""/181) 18:35:16 executing program 1 (fault-call:6 fault-nth:16): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c5401b7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xa8030000, 0x0) 18:35:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x4800) getsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f0000000180), &(0x7f0000000140)=0x4) 18:35:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000200)=""/219) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000040)={{0x0, 0x3, 0x2, 0x3, 0x5}, 0x5, 0x1}) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 725.340042] FAULT_INJECTION: forcing a failure. [ 725.340042] name failslab, interval 1, probability 0, space 0, times 0 [ 725.396608] CPU: 0 PID: 23876 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 725.403670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.413026] Call Trace: [ 725.415633] dump_stack+0x1d3/0x2c6 [ 725.419283] ? dump_stack_print_info.cold.1+0x20/0x20 [ 725.424490] ? kasan_check_read+0x11/0x20 [ 725.429035] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 725.429070] should_fail.cold.4+0xa/0x17 [ 725.438480] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 725.443594] ? is_bpf_text_address+0xd3/0x170 [ 725.448101] ? kernel_text_address+0x79/0xf0 [ 725.452513] ? unwind_get_return_address+0x61/0xa0 [ 725.457439] ? __save_stack_trace+0x8d/0xf0 [ 725.461785] ? find_held_lock+0x36/0x1c0 [ 725.465885] ? ___might_sleep+0x1ed/0x300 [ 725.470055] ? arch_local_save_flags+0x40/0x40 [ 725.474667] __should_failslab+0x124/0x180 [ 725.478910] should_failslab+0x9/0x14 [ 725.482735] kmem_cache_alloc_trace+0x2db/0x750 [ 725.487418] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 725.492971] mpi_alloc+0x4b/0x230 [ 725.496435] dh_compute_value+0x8d/0x690 [ 725.500511] ? __init_waitqueue_head+0x9e/0x150 [ 725.505204] ? dh_exit+0x20/0x20 [ 725.508579] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 725.514127] ? __phys_addr+0xa6/0x120 [ 725.517944] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 725.523495] ? __keyctl_dh_compute+0xb52/0x1bf0 [ 725.523518] __keyctl_dh_compute+0xdc5/0x1bf0 [ 725.523533] ? find_held_lock+0x36/0x1c0 [ 725.523562] ? copy_overflow+0x30/0x30 [ 725.523581] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 725.523599] ? proc_fail_nth_write+0x9e/0x210 [ 725.532753] ? proc_cwd_link+0x1d0/0x1d0 [ 725.532787] ? __might_fault+0x12b/0x1e0 [ 725.532809] ? lock_release+0xa00/0xa00 [ 725.540733] ? arch_local_save_flags+0x40/0x40 [ 725.540771] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 725.540789] ? _copy_from_user+0xdf/0x150 [ 725.550806] keyctl_dh_compute+0xc5/0x11f [ 725.550824] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 725.550839] ? lockdep_hardirqs_on+0x421/0x5c0 [ 725.550862] ? __bpf_trace_preemptirq_template+0x30/0x30 18:35:16 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1c1, 0x0) 18:35:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x10000000, 0x0) 18:35:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0xfffffffffffffffe, 0x0) [ 725.558970] __x64_sys_keyctl+0x17a/0x430 [ 725.600218] do_syscall_64+0x1b9/0x820 [ 725.604122] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 725.609499] ? syscall_return_slowpath+0x5e0/0x5e0 [ 725.614437] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 725.619299] ? trace_hardirqs_on_caller+0x310/0x310 [ 725.624330] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 725.629356] ? prepare_exit_to_usermode+0x291/0x3b0 [ 725.634388] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 725.639267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.644460] RIP: 0033:0x457ec9 [ 725.647662] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 725.666570] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 725.674288] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 725.681561] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 725.688834] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 18:35:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xf, 0x10, r2, 0x180000000) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8000, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x27, &(0x7f0000000140)={@broadcast, @broadcast}, 0x8) [ 725.696113] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 725.703384] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:16 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x9f, 0x0) 18:35:17 executing program 1 (fault-call:6 fault-nth:17): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000000), 0x10000000000002c6, &(0x7f0000000040)=[@op={0x18, 0x117, 0x3, 0x1}], 0x11}], 0x1, 0x1000000000000000) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:17 executing program 2: accept4(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000000)=0x80, 0x800) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000001c0)={@multicast2, @multicast2}, &(0x7f0000000200)=0xc) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x4000, 0x0) 18:35:17 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x124, 0x0) 18:35:17 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_tgsigqueueinfo(0x0, r0, 0x3, &(0x7f0000000200)={0x3, 0x8, 0xde0e}) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$amidi(&(0x7f0000000440)='/dev/amidi#\x00', 0xfff, 0x80800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000480)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e23, 0x9, @ipv4={[], [], @broadcast}, 0x6}], 0x2c) r4 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x1, 0x400000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000380)=[@in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e24, 0x7, @ipv4={[], [], @loopback}, 0x5}, @in6={0xa, 0x4e23, 0x7fffffff, @mcast1, 0x4}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e21, 0x1, @local, 0xffffffffffffffff}], 0x84) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x80, 0x220000) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) ioctl$EVIOCGKEYCODE(r1, 0x80084503, &(0x7f0000000080)=""/181) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="290000008000000000000000000000000200000000000000ff070000000000a1c59495b1555c6ffb92c5ade5cc00010000000000000000"], 0x29) 18:35:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rfcomm\x00') ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000040)) lseek(r1, 0x0, 0x6) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 726.114766] FAULT_INJECTION: forcing a failure. [ 726.114766] name failslab, interval 1, probability 0, space 0, times 0 18:35:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(ccm(des3_ede-asm))\x00'}, 0xffffffffffffffa3) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000380)={0x0, 0xe0, &(0x7f0000000280)=[@in6={0xa, 0x4e21, 0x7070, @empty, 0x800}, @in6={0xa, 0x4e24, 0x100000001, @mcast1, 0x26a}, @in6={0xa, 0x4e22, 0x6, @ipv4={[], [], @remote}, 0x4}, @in6={0xa, 0x4e22, 0xffffffffffffc4f6, @remote, 0x3}, @in6={0xa, 0x4e24, 0xee, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffffffff}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x7a}, @in6={0xa, 0x4e24, 0x6, @mcast2, 0x7ff}, @in6={0xa, 0x4e22, 0x1, @loopback, 0x498}]}, &(0x7f00000003c0)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000400)={r3, 0x7}, &(0x7f0000000440)=0x8) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x101000, 0x0) ioctl$EVIOCGKEYCODE_V2(r4, 0x80284504, &(0x7f0000000180)=""/228) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:17 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1ffffffffe, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x32, r0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x200) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000140)={0x2, 0x5a3f, 0x7, 0x1, 0xa7, 0x1ff}) [ 726.249713] CPU: 1 PID: 23928 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 726.256789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.266161] Call Trace: [ 726.268770] dump_stack+0x1d3/0x2c6 [ 726.272412] ? dump_stack_print_info.cold.1+0x20/0x20 [ 726.277640] should_fail.cold.4+0xa/0x17 [ 726.281717] ? lock_downgrade+0x900/0x900 [ 726.285884] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 726.290999] ? kasan_check_read+0x11/0x20 [ 726.295165] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 726.300474] ? rcu_softirq_qs+0x20/0x20 [ 726.304454] ? unwind_dump+0x190/0x190 [ 726.308363] ? is_bpf_text_address+0xd3/0x170 [ 726.312871] ? find_held_lock+0x36/0x1c0 [ 726.316973] ? ___might_sleep+0x1ed/0x300 [ 726.321139] ? arch_local_save_flags+0x40/0x40 [ 726.325731] ? save_stack+0x43/0xd0 [ 726.329369] ? kasan_kmalloc+0xcb/0xd0 [ 726.333268] ? kmem_cache_alloc_trace+0x154/0x750 [ 726.338125] ? __keyctl_dh_compute+0xdc5/0x1bf0 [ 726.342798] ? keyctl_dh_compute+0xc5/0x11f [ 726.347134] __should_failslab+0x124/0x180 [ 726.351380] should_failslab+0x9/0x14 [ 726.355187] __kmalloc+0x2e4/0x760 [ 726.358780] ? mpi_alloc_limb_space+0x31/0x50 [ 726.363285] mpi_alloc_limb_space+0x31/0x50 [ 726.367611] mpi_powm+0x411/0x1ed0 [ 726.371167] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 726.376735] ? mpihelp_mul_karatsuba_case+0xda0/0xda0 [ 726.381944] ? mpi_alloc+0x4b/0x230 [ 726.385582] ? rcu_read_lock_sched_held+0x108/0x120 [ 726.390611] ? kmem_cache_alloc_trace+0x356/0x750 [ 726.395470] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 726.401030] dh_compute_value+0x3b3/0x690 [ 726.405195] ? dh_exit+0x20/0x20 [ 726.408571] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.414119] ? __phys_addr+0xa6/0x120 [ 726.417936] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.423482] ? __keyctl_dh_compute+0xb52/0x1bf0 [ 726.428167] __keyctl_dh_compute+0xdc5/0x1bf0 [ 726.432672] ? find_held_lock+0x36/0x1c0 [ 726.436768] ? copy_overflow+0x30/0x30 [ 726.440676] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 726.446235] ? proc_fail_nth_write+0x9e/0x210 [ 726.450741] ? proc_cwd_link+0x1d0/0x1d0 [ 726.454828] ? __might_fault+0x12b/0x1e0 [ 726.458901] ? lock_release+0xa00/0xa00 [ 726.462892] ? arch_local_save_flags+0x40/0x40 [ 726.467518] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.473068] ? _copy_from_user+0xdf/0x150 [ 726.477228] keyctl_dh_compute+0xc5/0x11f [ 726.481388] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 726.486149] ? lockdep_hardirqs_on+0x421/0x5c0 [ 726.490749] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 726.496215] __x64_sys_keyctl+0x17a/0x430 18:35:17 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, r0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5fb2, 0x0) r2 = getpgid(0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000140)=r2) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000180)=""/181) 18:35:17 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xd0, 0x0) [ 726.500378] do_syscall_64+0x1b9/0x820 [ 726.504276] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 726.509646] ? syscall_return_slowpath+0x5e0/0x5e0 [ 726.514579] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 726.519436] ? trace_hardirqs_on_caller+0x310/0x310 [ 726.524470] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 726.529535] ? prepare_exit_to_usermode+0x291/0x3b0 [ 726.529559] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 726.529586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.529612] RIP: 0033:0x457ec9 [ 726.547831] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 726.566741] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 726.574457] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 726.581732] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 726.589005] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 18:35:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x200000) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000040)) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 726.596277] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 726.603547] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:17 executing program 1 (fault-call:6 fault-nth:18): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) connect$netlink(r1, &(0x7f0000000180)=@unspec, 0xc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7fffffff) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:17 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'bridge_slave_1\x00', &(0x7f0000000200)=@ethtool_regs={0x4, 0x101, 0x7e, "be52c4697f497a75f0c7fc9de5abbc6ef1142c1ba22c3b03806a8079c6b74e14c7c7de25336f0c20f5f5067d837aaf6bc08e68e2206f78c73bd5c5e857f2dfddda1bc488feea1b91a3a1e5866b1d92f6cd191e742e409bb6e897645fef104b966c5848ba0e4245c62c888764ba9da36b2d6e5eaf55b500ee5af5a446f84e"}}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f00000002c0)=""/181) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x121000, 0x0) ioctl$RTC_UIE_OFF(r3, 0x7004) 18:35:17 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x10a, 0x0) 18:35:17 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) finit_module(r0, &(0x7f0000000000)='\x00', 0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) ioctl$SIOCNRDECOBS(r1, 0x89e2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2200000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, r3, 0x0, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x8880) getsockname$packet(r1, &(0x7f0000003180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000031c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003200)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000003300)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000003340)={{{@in6=@local, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000003440)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000003480)={@mcast1, 0x0}, &(0x7f00000034c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000003500)={{{@in=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000003600)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000003c40)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x21040}, 0xc, &(0x7f0000003c00)={&(0x7f0000003640)=@acquire={0x5b0, 0x17, 0x424, 0x70bd2d, 0x25dfdbff, {{@in6=@ipv4={[], [], @rand_addr=0xfffffffffffffffc}, 0x4d6, 0x2b}, @in6=@dev={0xfe, 0x80, [], 0x1e}, {@in6=@dev={0xfe, 0x80, [], 0x1a}, @in6=@remote, 0x4e22, 0x4, 0x4e21, 0x0, 0xa, 0x20, 0x20, 0x36, r4, r5}, {{@in6=@mcast2, @in=@broadcast, 0x4e20, 0x0, 0x4e23, 0x1, 0x2, 0xa0, 0xa0, 0xaf, 0x0, r6}, {0x8, 0x9, 0x20, 0x7, 0x9, 0x3, 0x8, 0x6}, {0x88, 0x1ff, 0x20, 0x8}, 0x5, 0x6e6bb4, 0x3, 0x1, 0x1}, 0x0, 0x3, 0x0, 0x70bd2a}, [@encap={0x1c, 0x4, {0x3, 0x4e20, 0x4e22, @in=@empty}}, @sa={0xe4, 0x6, {{@in=@loopback, @in=@local, 0x4e23, 0xffffffffffffff11, 0x4e23, 0x8, 0xa, 0x0, 0x20, 0x7f, r7, r8}, {@in6=@mcast2, 0x4d4, 0x7f}, @in6=@mcast1, {0x1, 0x0, 0xee06, 0x3, 0x80000000, 0xd3d, 0x2, 0x5}, {0x3, 0xa4d0, 0x9, 0x1}, {0xc89, 0x5d1, 0x1}, 0x70bd27, 0x34ff, 0x0, 0x1, 0x8, 0xa0}}, @policy_type={0xc, 0x10, {0x1}}, @tmpl={0x144, 0x5, [{{@in6=@ipv4={[], [], @loopback}, 0x4d4, 0x3c}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x25}, 0x3500, 0x4, 0x2, 0x81, 0x20, 0x8, 0x4}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d2, 0x32}, 0xa, @in=@multicast1, 0x3507, 0x2, 0x0, 0xe2, 0x1, 0x3, 0x5}, {{@in=@empty, 0x4d5, 0x2b}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3505, 0x2, 0x3, 0xa1, 0xffffffffffffffff, 0x10001, 0x100000000}, {{@in6=@ipv4={[], [], @empty}, 0x4d5, 0x33}, 0xa, @in6=@mcast2, 0x3503, 0x0, 0x0, 0x3, 0x6, 0x0, 0x6}, {{@in6=@mcast1, 0x4d4, 0xff}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3507, 0x3, 0x3, 0x6, 0x100000001, 0x1, 0x3}]}, @algo_comp={0x11c, 0x3, {{'deflate\x00'}, 0x688, "e7221d50ec31bdac1f65f447712a9463d3e1ff061a58834b18e388c8438462758c1f10f5d9bd0abaf9b3673dff9b4eec1877505cdc4fdd9a4740e117be63a867dd699f05f519aabf4ba6339b97c82bff095fa52ffd97b1fc2a44272eb0563585c48b41cf0947fe9efbe9a6fce7efaaa235708e7114d42837e2bf6bd22604caf85c75b3f440f3eccf51706a65fee83ff1ac3f6d44f17734e425f4b0f31dca569056f1ada218046fa2b6b93c0dc1de99f2ba9d375dbd862ba3ec1fb0ff38391515ecb8b43e35fd307bc2685acef03abc2473"}}, @algo_crypt={0x11c, 0x2, {{'ecb-camellia-asm\x00'}, 0x698, "8418048d1e45fa0c6941310fa49d0402889e686580922ecf8d1bd4a9c7756153713e1be579c804497811e37d9d5be9aac18e6e0c1a306fb755093c406c077dd972fa5ccc2bf4dccafcb78648bf9a269a6fbdb09a5f093fb453a6e949b10ebb6f40a16036e227856fbda59a932b5f5a99268de2a089203e78000b7c998d748baf8e9efcc9413b9866f0e28d0a9045517d4d8aa93999f3342aaae9464c950a8311e4046064ab1beae3abc97ebaf24f9cd6ba823116c98b58e5fc0c675cf4dab1b22ed5c05ac2977ec155f280be8b593067cf13fd"}}]}, 0x5b0}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) getresuid(&(0x7f0000000280), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80000, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}, {@version_9p2000='version=9p2000'}, {@uname={'uname', 0x3d, 'lrw(serpent)\x00'}}, {@cache_none='cache=none'}], [{@uid_lt={'uid<', r9}}]}}) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 726.901966] FAULT_INJECTION: forcing a failure. [ 726.901966] name failslab, interval 1, probability 0, space 0, times 0 [ 726.920954] CPU: 1 PID: 23977 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 726.927987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.937347] Call Trace: [ 726.939964] dump_stack+0x1d3/0x2c6 [ 726.943608] ? dump_stack_print_info.cold.1+0x20/0x20 [ 726.948819] ? kernel_text_address+0x79/0xf0 [ 726.953260] should_fail.cold.4+0xa/0x17 [ 726.957501] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 726.962687] ? save_stack+0xa9/0xd0 [ 726.966344] ? save_stack+0x43/0xd0 [ 726.969979] ? __kmalloc+0x15d/0x760 [ 726.973723] ? mpi_alloc_limb_space+0x31/0x50 [ 726.978225] ? mpi_powm+0x411/0x1ed0 [ 726.981966] ? dh_compute_value+0x3b3/0x690 [ 726.986302] ? __keyctl_dh_compute+0xdc5/0x1bf0 [ 726.990979] ? keyctl_dh_compute+0xc5/0x11f [ 726.995306] ? __x64_sys_keyctl+0x17a/0x430 18:35:18 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xd7, 0x0) 18:35:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)={0x6, 0x5}) socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x1, 0x8000) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000180)={0x5, &(0x7f00000000c0)=[{0x3, 0x0, 0x5, 0xffff}, {0x394f, 0x3, 0xa3, 0x3}, {0x1, 0x1, 0x1, 0x8}, {0x8001, 0x0, 0x100, 0x3}, {0x100000000, 0x0, 0x0, 0x10000}]}) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xdac4, 0x200) [ 726.999641] ? do_syscall_64+0x1b9/0x820 [ 727.003725] ? find_held_lock+0x36/0x1c0 [ 727.007813] ? ___might_sleep+0x1ed/0x300 [ 727.011985] ? arch_local_save_flags+0x40/0x40 [ 727.016605] __should_failslab+0x124/0x180 [ 727.020855] should_failslab+0x9/0x14 [ 727.024663] __kmalloc+0x2e4/0x760 [ 727.028219] ? rcu_read_lock_sched_held+0x108/0x120 [ 727.033252] ? __kmalloc+0x5ed/0x760 [ 727.036986] ? mpi_resize+0x17a/0x207 [ 727.040799] mpi_resize+0x17a/0x207 [ 727.044436] mpi_powm+0x72a/0x1ed0 [ 727.048008] ? mpihelp_mul_karatsuba_case+0xda0/0xda0 [ 727.053233] ? mpi_alloc+0x4b/0x230 [ 727.057304] ? rcu_read_lock_sched_held+0x108/0x120 [ 727.062331] ? kmem_cache_alloc_trace+0x356/0x750 [ 727.067183] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 727.072736] dh_compute_value+0x3b3/0x690 [ 727.072759] ? dh_exit+0x20/0x20 [ 727.072773] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.072790] ? __phys_addr+0xa6/0x120 [ 727.072805] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.072824] ? __keyctl_dh_compute+0xb52/0x1bf0 [ 727.089649] __keyctl_dh_compute+0xdc5/0x1bf0 [ 727.089665] ? find_held_lock+0x36/0x1c0 [ 727.089704] ? copy_overflow+0x30/0x30 [ 727.089724] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 727.089742] ? proc_fail_nth_write+0x9e/0x210 [ 727.089760] ? proc_cwd_link+0x1d0/0x1d0 [ 727.099978] ? __might_fault+0x12b/0x1e0 [ 727.100002] ? lock_release+0xa00/0xa00 [ 727.100017] ? arch_local_save_flags+0x40/0x40 [ 727.100052] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.144628] ? _copy_from_user+0xdf/0x150 [ 727.148792] keyctl_dh_compute+0xc5/0x11f 18:35:18 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1bb, 0x0) [ 727.153043] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 727.157803] ? lockdep_hardirqs_on+0x421/0x5c0 [ 727.162407] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 727.167906] __x64_sys_keyctl+0x17a/0x430 [ 727.172083] do_syscall_64+0x1b9/0x820 [ 727.175992] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 727.181375] ? syscall_return_slowpath+0x5e0/0x5e0 [ 727.186313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 727.191177] ? trace_hardirqs_on_caller+0x310/0x310 [ 727.196215] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 727.201244] ? prepare_exit_to_usermode+0x291/0x3b0 [ 727.206276] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 727.211140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.216338] RIP: 0033:0x457ec9 [ 727.219539] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 727.238449] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 727.246169] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 18:35:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000600)='/dev/full\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000280)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000180)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, r4, 0x220, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x1, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) init_module(&(0x7f0000000540)='\xac^(}user\x00', 0x9, &(0x7f0000000580)='TIPC\x00') sendmsg$nl_route(r2, &(0x7f0000000300)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="5c0000001a0000032cbd7000fbdbdf251cb000000401fe0f0029000008001a000400000008001a00060000002800010000000000000000c000000040ff000000000000000000100000000000ff000000ff000000080004004f265d9e2158a200cfc3ae7c16648d7aa8e71e465ea5996607d5ab764685a1728728f86dd9822e8d442ed8f7b12110144f5bc4a45fd7d3", @ANYRES32=r3], 0x5c}, 0x1, 0x0, 0x0, 0x44000}, 0x4000) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x44) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:18 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) accept4$inet(r1, 0x0, &(0x7f0000000140), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) [ 727.253446] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 727.260724] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 [ 727.267997] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 727.275269] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 [ 727.275469] atkbd serio0: Spurious ACK on isa0060/serio0. Some program might be trying to access hardware directly. 18:35:18 executing program 1 (fault-call:6 fault-nth:19): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000000280)=""/157, 0x9d}, {&(0x7f0000000340)=""/130, 0x82}, {&(0x7f0000000400)}, {&(0x7f0000000440)=""/57, 0x39}, {&(0x7f0000000540)=""/123, 0x7b}, {&(0x7f0000000480)=""/28, 0x1c}], 0x8, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="d2cafe0b1cd762d589995c07c0088b66812026dcf16555d6e625ad48e2156e0e3773951e8fb15fdcc67ed89d314af75150ec040118c7485e1db7140c77c1bb76a6b90581ab81a7494b97b639c262eabf880993ca60db3ca7abf018634d4b3314dcf62054cf13795b0e3d93397ee1625c4743d81684b1fa5b51d7513215e45918813ef251fe567487d847bb8fd3b3ddb49bf3a6618972fbd81141300b9cfa13a4d982", 0xa2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:18 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x11f, 0x0) 18:35:18 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x400, 0x0) accept$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="0098510070a50100ffffffff37f08000ffffffff6810f8ff04000000000000000000000000000000"], &(0x7f0000000100)='GPL\x00', 0x7, 0xd7, &(0x7f00000002c0)=""/215, 0x41000, 0x1, [], r2, 0x4}, 0x48) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0xff, 0xf2, 0x1, 0x3, 0x1c}, 0x14) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, r0, 0xfffffffffffffffe) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000200)=""/181) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 18:35:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000040)=0x7fffffff) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:18 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000140)={0x0, 0x6c, 0x7, 0x3, &(0x7f000058e000/0x2000)=nil, 0xfffffffffffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60, 0x0, 0x3, {{0x6, 0x101, 0x1, 0x6, 0x7f6febf1, 0x0, 0x100000001, 0x2}}}, 0x60) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x3, 0x2d}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000240)={r2}, &(0x7f0000000280)=0x8) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000080)={0x6265, 0x0, 0x10003, 0x6}) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f00000000c0)={0x7e6f, r5}) [ 727.659346] FAULT_INJECTION: forcing a failure. [ 727.659346] name failslab, interval 1, probability 0, space 0, times 0 [ 727.731768] CPU: 1 PID: 24025 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 727.738825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.748185] Call Trace: [ 727.750794] dump_stack+0x1d3/0x2c6 [ 727.754451] ? dump_stack_print_info.cold.1+0x20/0x20 [ 727.759663] ? unwind_get_return_address+0x61/0xa0 [ 727.764619] should_fail.cold.4+0xa/0x17 [ 727.768706] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 727.773821] ? save_stack+0xa9/0xd0 [ 727.777456] ? save_stack+0x43/0xd0 [ 727.781101] ? mpi_powm+0x72a/0x1ed0 [ 727.784824] ? dh_compute_value+0x3b3/0x690 [ 727.789156] ? __keyctl_dh_compute+0xdc5/0x1bf0 [ 727.793836] ? keyctl_dh_compute+0xc5/0x11f [ 727.798171] ? __x64_sys_keyctl+0x17a/0x430 [ 727.802511] ? do_syscall_64+0x1b9/0x820 [ 727.806585] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.811964] ? keyctl_dh_compute+0xc5/0x11f [ 727.816292] ? __x64_sys_keyctl+0x17a/0x430 [ 727.820621] ? do_syscall_64+0x1b9/0x820 [ 727.824707] ? find_held_lock+0x36/0x1c0 18:35:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x1) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = accept$alg(r0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000180)={0x0, 0x0, @ioapic={0x2000, 0x40, 0x2, 0x5, 0x0, [{0x25526368, 0x6, 0x7fff, [], 0x6}, {0x5, 0x80000000, 0x742c0000, [], 0x1ff}, {0x6, 0x5, 0x7, [], 0x8}, {0x3, 0x3, 0x2, [], 0x3f}, {0x100, 0x7, 0x5, [], 0x2aa2}, {0x1f, 0x10000, 0x7f, [], 0xa5}, {0x9, 0x8, 0x81, [], 0x9}, {0x4, 0x0, 0x0, [], 0x9}, {0x800, 0x80000000, 0x9c, [], 0x5f0e}, {0x1f, 0xfff, 0x4f, [], 0x4}, {0x6, 0x100000001, 0x100000000, [], 0x6}, {0x33f4052b, 0x3, 0xb04}, {0x1, 0x1, 0x9a, [], 0x8a}, {0xad8, 0x10000, 0x200, [], 0x8001}, {0x8, 0xffffffff, 0x3800000000000000, [], 0x1ff}, {0x0, 0x7, 0xbd84, [], 0x7b}, {0x10000, 0x99e3, 0xffffffffffffffff}, {0x2ffd, 0x455e, 0x9, [], 0x2000000000}, {0x20, 0x40, 0x75, [], 0x1}, {0x6, 0xe691, 0x7fff, [], 0x5}, {0xf81, 0x9, 0x8, [], 0xff}, {0x6, 0xffff, 0x68, [], 0xa476}, {0xfff, 0x7e, 0x3fce5607, [], 0x5}, {0x800, 0x7, 0x5, [], 0x5ab8}]}}) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) [ 727.828796] ? ___might_sleep+0x1ed/0x300 [ 727.832959] ? arch_local_save_flags+0x40/0x40 [ 727.837569] __should_failslab+0x124/0x180 [ 727.841815] should_failslab+0x9/0x14 [ 727.845619] __kmalloc+0x2e4/0x760 [ 727.849167] ? mpi_resize+0x17a/0x207 [ 727.853016] ? mpi_alloc_limb_space+0x31/0x50 [ 727.857529] mpi_alloc_limb_space+0x31/0x50 [ 727.861863] mpi_powm+0xc19/0x1ed0 [ 727.865430] ? mpihelp_mul_karatsuba_case+0xda0/0xda0 [ 727.870628] ? mpi_alloc+0x4b/0x230 [ 727.874275] ? rcu_read_lock_sched_held+0x108/0x120 [ 727.879308] ? kmem_cache_alloc_trace+0x356/0x750 [ 727.884165] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 727.889741] dh_compute_value+0x3b3/0x690 [ 727.893905] ? dh_exit+0x20/0x20 [ 727.897290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.902843] ? __phys_addr+0xa6/0x120 [ 727.906653] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.912213] ? __keyctl_dh_compute+0xb52/0x1bf0 [ 727.916902] __keyctl_dh_compute+0xdc5/0x1bf0 [ 727.921418] ? find_held_lock+0x36/0x1c0 [ 727.925506] ? copy_overflow+0x30/0x30 18:35:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x480000a}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r2, 0x0, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x1f, @link='syz0\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x50) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="dab962f10356b879091cb9a9b354a544169828ba75eb4ee8be74dfe86924855f383ef64fc83a6b0f3071a26d6af82e2a53fb45cc4b6c15ca0b1d59db396f372b83447bbf", 0x44) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 727.929407] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 727.934969] ? proc_fail_nth_write+0x9e/0x210 [ 727.939475] ? proc_cwd_link+0x1d0/0x1d0 [ 727.943565] ? __might_fault+0x12b/0x1e0 [ 727.947638] ? lock_release+0xa00/0xa00 [ 727.951621] ? arch_local_save_flags+0x40/0x40 [ 727.956233] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.961790] ? _copy_from_user+0xdf/0x150 [ 727.965961] keyctl_dh_compute+0xc5/0x11f [ 727.970114] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 727.970129] ? lockdep_hardirqs_on+0x421/0x5c0 [ 727.970152] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 727.970172] __x64_sys_keyctl+0x17a/0x430 [ 727.970193] do_syscall_64+0x1b9/0x820 [ 727.970211] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 727.970229] ? syscall_return_slowpath+0x5e0/0x5e0 [ 727.970246] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 728.008158] ? trace_hardirqs_on_caller+0x310/0x310 [ 728.013188] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 728.018223] ? prepare_exit_to_usermode+0x291/0x3b0 [ 728.023257] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 728.028116] entry_SYSCALL_64_after_hwframe+0x49/0xbe 18:35:19 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x220100, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x2, 0x200, 0xfff, 0xff, 0xe}, &(0x7f0000000240)=0x98) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000280)={r1, 0x8a}, 0x8) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000000)=0xfffffffffffffffd) mmap(&(0x7f000052c000/0x4000)=nil, 0x4000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r2, 0x40084503, &(0x7f0000000080)=""/181) [ 728.033314] RIP: 0033:0x457ec9 [ 728.036515] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 728.055433] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 728.055449] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 728.055458] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 18:35:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') setsockopt$inet_group_source_req(r2, 0x0, 0x0, &(0x7f0000000180)={0x18000000, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e24, @multicast1}}}, 0x108) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) recvmmsg(r0, &(0x7f0000004500), 0xd5, 0x0, 0x0) [ 728.055467] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 [ 728.055477] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 728.055486] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:19 executing program 1 (fault-call:6 fault-nth:20): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:19 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xfa, 0x0) 18:35:19 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0x12, &(0x7f0000000000)='/dev/input/event#\x00', 0xffffffffffffffff}, 0x30) prlimit64(r2, 0x4, &(0x7f0000000180)={0x4, 0x21}, &(0x7f0000000200)) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:19 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000000)={0x7fff, 0x4, 0x3, 0x2, 0x2000000, 0x1}) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3ff, 0x8000) sendfile(r1, r0, &(0x7f00000000c0), 0x7) write$input_event(r1, &(0x7f0000000040)={{}, 0x17, 0x20, 0xffffffff7fffffff}, 0x18) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) accept(r0, &(0x7f0000000380)=@ethernet={0x0, @broadcast}, &(0x7f0000000400)=0x80) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000280)=0xe8) recvfrom(r0, &(0x7f0000000300)=""/87, 0x57, 0x60, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)={'team0\x00', r2}) r3 = accept$alg(r0, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x400, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a075c14736ac7096ba554dbb7000089", 0x8) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='wlan1em1user\'\x00', 0xe, 0x1) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000080)={0x9d0000, 0x86, 0x9, [], &(0x7f0000000040)={0xa10906, 0x6, [], @p_u16=&(0x7f0000000000)=0x100000001}}) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000240)={{0x47, 0x3e}, 'port0\x00', 0x0, 0x1, 0x20, 0x23111fb8, 0x1, 0xe2, 0x0, 0x0, 0x2, 0x7}) 18:35:19 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x75, 0x0) 18:35:19 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fsetxattr$security_smack_transmute(r1, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) [ 728.433973] FAULT_INJECTION: forcing a failure. [ 728.433973] name failslab, interval 1, probability 0, space 0, times 0 [ 728.490444] CPU: 1 PID: 24066 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 728.497499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.506857] Call Trace: [ 728.509482] dump_stack+0x1d3/0x2c6 [ 728.513142] ? dump_stack_print_info.cold.1+0x20/0x20 [ 728.518358] ? __kernel_text_address+0xd/0x40 [ 728.522870] ? unwind_get_return_address+0x61/0xa0 [ 728.527823] should_fail.cold.4+0xa/0x17 [ 728.531898] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 728.537032] ? save_stack+0x43/0xd0 [ 728.540671] ? kasan_kmalloc+0xcb/0xd0 [ 728.544572] ? __kmalloc+0x15d/0x760 [ 728.548293] ? mpi_alloc_limb_space+0x31/0x50 [ 728.552790] ? mpi_powm+0xc19/0x1ed0 [ 728.556512] ? dh_compute_value+0x3b3/0x690 [ 728.560844] ? keyctl_dh_compute+0xc5/0x11f [ 728.565171] ? __x64_sys_keyctl+0x17a/0x430 [ 728.569499] ? do_syscall_64+0x1b9/0x820 [ 728.573570] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.578959] ? find_held_lock+0x36/0x1c0 [ 728.583051] ? ___might_sleep+0x1ed/0x300 [ 728.587210] ? arch_local_save_flags+0x40/0x40 [ 728.591802] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 728.597360] __should_failslab+0x124/0x180 [ 728.601605] should_failslab+0x9/0x14 [ 728.605414] __kmalloc+0x2e4/0x760 [ 728.608970] ? mpi_resize+0x17a/0x207 [ 728.612783] ? mpi_alloc_limb_space+0x31/0x50 [ 728.617293] mpi_alloc_limb_space+0x31/0x50 [ 728.621628] mpi_powm+0x10ba/0x1ed0 [ 728.625282] ? mpihelp_mul_karatsuba_case+0xda0/0xda0 [ 728.630476] ? mpi_alloc+0x4b/0x230 [ 728.634115] ? rcu_read_lock_sched_held+0x108/0x120 [ 728.639142] ? kmem_cache_alloc_trace+0x356/0x750 [ 728.644012] dh_compute_value+0x3b3/0x690 [ 728.648175] ? dh_exit+0x20/0x20 [ 728.651561] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 728.657108] ? __phys_addr+0xa6/0x120 [ 728.660921] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 728.666494] ? __keyctl_dh_compute+0xb52/0x1bf0 [ 728.671180] __keyctl_dh_compute+0xdc5/0x1bf0 [ 728.675684] ? find_held_lock+0x36/0x1c0 [ 728.679773] ? copy_overflow+0x30/0x30 [ 728.683674] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 18:35:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xfffffebc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000001c0)=0x0) ioprio_set$pid(0x3, r2, 0x9) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000000)=""/79, 0x4f, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r3, 0x4) [ 728.689232] ? proc_fail_nth_write+0x9e/0x210 [ 728.693790] ? proc_cwd_link+0x1d0/0x1d0 [ 728.697886] ? __might_fault+0x12b/0x1e0 [ 728.701969] ? lock_release+0xa00/0xa00 [ 728.705975] ? arch_local_save_flags+0x40/0x40 [ 728.710588] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 728.716135] ? _copy_from_user+0xdf/0x150 [ 728.720301] keyctl_dh_compute+0xc5/0x11f [ 728.724461] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 728.729233] ? lockdep_hardirqs_on+0x421/0x5c0 [ 728.733834] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 728.739297] __x64_sys_keyctl+0x17a/0x430 [ 728.743453] do_syscall_64+0x1b9/0x820 [ 728.743471] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 728.743490] ? syscall_return_slowpath+0x5e0/0x5e0 [ 728.743505] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 728.743521] ? trace_hardirqs_on_caller+0x310/0x310 [ 728.743540] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 728.743558] ? prepare_exit_to_usermode+0x291/0x3b0 [ 728.743578] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 728.782419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.787611] RIP: 0033:0x457ec9 18:35:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80000, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 728.790815] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 728.809730] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 728.817452] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 728.824731] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 728.832005] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 18:35:20 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xdf, 0x0) 18:35:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$llc(r2, &(0x7f0000000040)="be687b1b504a026651f90886cbfe5d22defe92657f5963338aa33c8ad299793b698016c73d9ba80da81e3e167d00f225ae0ade481fde9cba92148088cccfaedb91e159c8873bc41dd7440badb92f1ec6eb2da39000840559bb37a5fd", 0x5c, 0x0, &(0x7f00000000c0)={0x1a, 0x103, 0x1000, 0x5602, 0xff, 0x100000000, @local}, 0x10) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 728.839287] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 728.846559] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:20 executing program 1 (fault-call:6 fault-nth:21): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:20 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl(r1, 0x9, &(0x7f0000000200)="303ebcbc0842b34d669e74d6e4e8da831a7160e05687288b4848a2adb9f5889d01281e5bff2c34496b41d931e053060288d737945d6ebeb49f0ce4b723134c1f1caf7b6b5d00ecc7efb516609f6f49a252a9e7bd8592226ede3c92fce9ebbfe0ef4e885e1b852325e7f03789c5629fe1dd0633643c686a638b36ec24e45caaf9631fe00c6b08a80bbb15c7bb8703d54ae2b2978b539bc1b2e629d22c9b334199bf4436b33929132f81b756a3c83411ecc8de77a35e2b087db59d9d41c1f17b625b64ee9e039ffabb7359cb9e3ca8076214975f565652d4fa577226b597db75a96f1d4ce7a648b59a0eb41f9b4aeeb6d727f2b15e58348170245165abfa9dc06bed8bb0894e8d0684305d8966495d0fe13b88309c9ae25d77d5658990688789c009868ff3d624a046ff76883d63a18dedfcf13869f16c857d0479831ef80cdc8d664275da008add1c63f5c1e5a57d08f06514fdc01c62689c33e5dfe3cce909e2509a4f45cb1db7d1bac3e8788ab810f92978c08956b617c8a822352f72045af4e152af027fa44877743179b03609f854e2e70b973fc3b8e327781a896855f34eb24d73f3466f2afdc28b51607bc7b12c1d3fc72f119d5752b1f86db29397d55666a31ad839d308ac4cf1b2163596ce326852e4638920e5851bc42a3e8733d9f2784b205254ce67de5f0fdca58cce46544648ce27b10093c856407334f5bf19be179eaa4ca327975dbc2eb9f40df11f14e8e17affe1bd920ab57fe7861d893e58ed5461c51ecfd051541087743f1558c16134bee6944417b23a60bdf589ba4eb9e70d36a523836ba473a3542be95d7ce3c4412541531cd91b365177e41fc2d1392e22d10503d0afcf3ba8bcc3cca76d2453b07aa6ccf3a800195c70a16e1255112147d3c0b68b00830a815415837806e2cc18e60c713d58e88359e89dc3822815035e5368982c8ba8993dd9baf8b1f746f89a0bf88569dd083955883a4b3ba7a17ba69de2b535c23f43e98233153378b35d9a075741a43793e338159772e0903252485f506c322ca19ae27fb2415c7ebca40fd773ee15804d08323c78d8ce6706997cfb0850c4301580ace33b6906ace29c8f410977aca54dfb59707be589537b78d6807d9edb780663811d242f25ec53ef4daab817f2ca27c37ac61f4fb5bec7deae1b642e49df256659fc08e4409276ac986c8ed9a5f390f6d84f4fc8aac96a6e75ca73cf59a10978c0b8c0412ea30dc15ebe6be860488435c438244a556877aae3a351cb6d3aa877a19ad342fb0052035ab0c42c3b0804fd8ea04c225f066d2441f3e6964f5abbdd453e8e1acb728d2a011f70cb01c9bf8d7821a6a3029347e047dfd6163d3a97cb22ce12f35c35d1193b30f499ccfe6b627919f43770285a050c9d87fb891cabc45ce84ba06b3572195de09e1325165319b56ce80735ab300a18021de3181243d95992b83f8afa854560ac0da5a817e10eed5e77d23e5d1385b7687bdc7f58f23ead70a612b4bcbcce5d3a0a9e846094ca8ebfa5580917649f0fa0fe867fd12936a01f53ed960a0410add5cc65c1123565d98ef1c8fefeaa1456e50fb67102afbeb0cc5d40e8beb14ce874ab31626356896047d54a808791612223dc3bb8b29c95bd387739a317caab69c93796e21f74093597248e91b4e7603900d44798e07ba851b98aaa9f43caae49834603706a900d54295e50ec05a1affb0722407ad10467493bed4d1127e7f85beeabcabf3e53f33bc33c24496e5618ecfbe67f994f08ecb68f9c6c3d53f473ec180fc45372a004acfaaccec88039d16cc679ca9fcdaf91f36f6499ff7ba3ca15118886c0204b996194def3e72b752ce343614368e75bcb902074aa4bf1baad8d0ea92013133b2b5345e386a2e60f052dada63cca25fb7749400102d6c5bb7376838e1407cdda5c7319f821549ca3810bb5269195d792e14915f7f774e09b39555f5cbc5cbefe092f2bb2e794643788cd661287aa68c7d7a78476fa36d376df0cda3bcf05df75175bdc882df86af678c6cef781760885ce053d7b6420076180ccc8da793a28d654f8a082357409b13f79bd52a0a479e351c5156b8df4f9c6006e67ef8389ff06c99f6e8543b688d2ca9badb9190468b5f58d0f0638249b71b1c9b12821879d4c968d03b1fc73ab773566d3af5e1e0f4fe6433b14784156ab3af0dc917b935e5b27b29a13672d475cebaaeb27c6c157ec6e6774873a29b844b15cd8dd2e41d349d4e48558e4d2a6f7c64b1409333dbed798149fe54ebc15ff6ce5ccc1cb521d3fb1e3324836ad07cfd3759466a7274aa733ee2b59821cdae2042d195bcfa877e58040c1e83655886653a1d13bdc144efcac79d53d67a4503295c2d70496e83e3255974cdd7f119a7286800b61bba12f161637aec91f37fd7ba34e9333b993ac6e5f5cf6067963ca1cb765dc7e4b7ceae7862156e06bf425559ab325efb404fb0344989b5feb14855ae9234aa2a8352594c30217a8295a80343b93d3439c387971ea8cb29d98ed0cfcaab19df8c10203459e5017ae503f3d59c1b8add61fc9af1ca410a18b017de205a641131d0c4c98c5a562a0e7248e143fb7da56b5e704154b2832a498d0a97fd130ac4258767e49c0006381f29637c719e3df5ad95ca5ddc38492c06daecff5e66c335f97609901ae322148cb48b151d1e5e5fe1b27c873e409c7cd1f40ad9106c6488f5cc4b6034275a0b56b34280f36f3614af14fef4f794ff15c5ce04db35560436813cfbbe4b57c96984eb345cd0de90a0f1f68887b8b892f2fd01ebbda7e86587524c990258eb77554ee7b5aff047117c198db097af317b2d43d74cf2bae2200c6ac991dcbd2aac90f9595bf8b6567c45f1aa888ab3df0a08b44a09350f8fb0a8a54baa4be4776280816bea04e8cc8728c1733ead8573e3ed24c225af17dd27f0b4e7b99ad00e2b97b2f7ffa44e2730e3197a60b53626413e8e39ead60dfdb65936fba4fb90ad93738dcbd6c1a319ae1d564e014cae04e04157d6541affc80b68fb9f86cf4c307bfa738ae047a30d749c5da2bbff42961cd34aff88f0e3c7cd10cc4dc7eb4e14b7d4f0848f9f242629e25bd9d9800d726fbf9993eda1fd681076b7d2e0ec7e88defd7ab18f54d203b2d053466ecfa9599aedecefbba15a1837d71b646b32faf7ab488b2ecf99ddfaca0b444cd4075a5ce785d8a4303c152a543529ead2906266decf03be2c402c170fa055c95d84f216af6a68fa7303212e672251abbd89fc2749f6aaa7c9d0ef4478e3d43e766121da46d2e817a89bc06f2a5f0d7931ed25f78941f3d4048af8b31f86ec053769cf1997d19674305552d06beb1dacccca017657cbb113e1ee19c73afa830a734c1a3968bd4d1caca68c4e338da9666e35a693065b365bda39b71b52e8caf82a78898d3a94ba8b590092172ea67d127c4849a8b01b5593d0dcfc517d287f4c8f1cadc13f0161fb1c8cb22efa5f69c3be759003ba7ed8fd105f303b6dce0c8230cd24c7a4e5c857b0edbb9549ac466cd689b2db6e17927804d8cfa868198987eb997387747d4c95f7eff63273bfc79fbd082eb4684e492b3523ab4b3f034a18dfda35617ca49d088961a6305d90ed418798ecbb8024559d4743d1b1cf5918ea3376328f1a46f8965561c954dbcb307d40df4ca92f85ba9dc798d2e1db33dcce10e11e9114cd1930d6cf7d28cf7a508dd1f4947baa812ae26ce6bbcf265d95962780a91b8f0c05ca58f17dca6fe0363d4657c37cb9ea29271185631366f500e813e3b98a703b2d5bfaf206ef1c17d074830a86b524fd8cba2f9737d2fa4810ddd7b26e9ad74e553069eedab2aab41414382fca3134bcdd38bcbf96604c409d7b006c7a705502552d1810274b94595d83418d0d90c21860a89f63fb3031975ef25c291fcfaeb9072b68e8a08cb93467417339ae2b6c6501cc351c062024cf99a11fba8a9e6401d236cd229bbbc1f6e63af55e53145ef7661c6d5b655900a0d74c1130f277997d04114e915c1988dacd841d3e6dedd7a565c820336c8360100804749b3c343f0839ead9dcb32716f52ebf6e8347fd60187b4580f2e67cd92543ae02c41b33e6037bade58e0512e17809531023a7e30229a3cfab4835e6be441ebc9e78320a4fa201c1b2d1e48d62746e32c539eb32cc640f31e6f3b51666081d07ee52141e86bb61cd0f827793ce17e4eda7e928b6569862471e83a605ad3dbe9760525922ee71d979ef48fdc9edf5b70ba0b6ff80db8b6e3f56cf2b8a246f41880bcb0a38357c93c9b9317b19d6aea9cb3a95c1dfeaf44ce808654a1db52870e66e10faed3cce501e58e74af07f9e935816afce451d3cfef2960d6df989de7916f81a15f7fa174f170a28f0bef5570dbdd5c41c608f3be518ea1e49c4231262b92d80c5e25b244b6da81675d04327afb51ca34fa47288236f1e7527f23a611dfe8993e4c491fd2104a72733340db666db46ef8f9b583ba0c2e1c73fd47c0a524cc952a2c23a0ab0093164ad01a1feb16f9bdb2161900a3fd95a95c3bfc14f328f23e3daf00fe5a4e5f1542c7490b685fefc72ddce9fb1adceb3bb519df153ae1c6e40f4a7c26c52bb388c5e15e5d36af4ef33cf131d07a8eaff425c54befeedcaff5a317fbbf8e759216dae3791f4e3d48282803f35b226c350f1147561f78c817da920a92e4034b6d6d317f4c1c94cb90628423f9a0a071cddef4797411d0993c491201347626a1702cd48f242d761ba93f5bad8006acfee7b05593246445959e6e593cb2996674df18aaaf2f89a63d5e2dbbc22476ce07089ae469aafdcd8cf7fa731b3a654cef081aa30e9e9109c135cdcb843cbf8198e501c7033d4e502781c496729086c4cff544dd0c8bf399e6f7b37308a779fd2d03cadf80d21ba0335fad81f6069c9f509a61dccdab4fffe91027bd13b188b2b25e8d7d0f599d46498c307a6b3d21b5f934cc8de43160aa6ce30163406d1663bfe037e631c5a0490097d213e1eb51ec96bcce3dfbed92d21a2f4da9d0de3cb3ade4cd674143fbefcc236a6a106ea978f3645d884d28d56d5346aa66f87318087434a8cd8b5327050bd0b6f5b30a17373e655dbb9359cf828aa4ac421fbaea5a1c0d63e476d61946f6d85ae3de054a424892ff61f2fe0e01f93efb8c58ecf668e6fb34ba8502b6970c1e6edb8e8e0a78b4967c4aec6393334ff7f3dec5ee0a54754fdffa3bab85227943d62d4b26b0b1f23a750cb759ad2a2d84c28a9f654ed75371d9e0203db11e2bbf031199baeb30d7af6b28e3b34d16f1fe94a7c81e89d29038ece0ff74bd2fe8834f7407328398fd25d1c0beeac00bfab8842a2feff72de415a8c9d4a5d68477010e2d86e11817f7d62a080150b1b643be49e82de28f4f823f180a3a10e0bbc5596cfca9cf388b12c22695b14cac5adf935046530c8986632f1a76686363b6343755f4e21e3944bcfcfa892ce98ad754fe0da8268385a5e7338b23078247ab318048c33ede4860ec32e8465d9624568f1f005dd63a27b77857a347b81176d619d3d1051e3cef42d5542cb306a29682286fa391d42e2e7b45928bf6bffd332d6f9909f5123b15abc5a2246e1e6921a1cbb89e83ae51d2af99a28f08301c9e42c99cdeff3c38ccc3b66b1b8910a9e4ef7d587ac6360f89f2387294d4d2e180da0eeb72afe22d6b79dbabdbfb7f907e7e64b54ed3b0c7b41c7dfeedd5fe0d3ae88cbf4ef7bab6b3c72328f3b555c83ebd7b2a7517d400de461bc1b5aadb1cf0e416f03f3fefc981e0e9e31be6b6") ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x3) 18:35:20 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000d42000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:20 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x26, 0x0) 18:35:20 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xfffffffffffffc94) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000080)={0x21, 0x1ff}) socket$inet6(0xa, 0xb, 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendfile(r0, r0, &(0x7f0000000040), 0x6) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:20 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) creat(&(0x7f0000000000)='./file0\x00', 0x100) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x1, 0x20000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fd) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:20 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x84, 0x0) [ 729.191842] FAULT_INJECTION: forcing a failure. [ 729.191842] name failslab, interval 1, probability 0, space 0, times 0 18:35:20 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/40, &(0x7f00000000c0)=0x28) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/229, 0xe5}]}}], 0x1, 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x5) [ 729.263305] CPU: 1 PID: 24104 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 729.270415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.279770] Call Trace: [ 729.282370] dump_stack+0x1d3/0x2c6 [ 729.286014] ? dump_stack_print_info.cold.1+0x20/0x20 [ 729.291217] ? __switch_to_asm+0x34/0x70 [ 729.295293] should_fail.cold.4+0xa/0x17 [ 729.299362] ? __switch_to_asm+0x34/0x70 [ 729.303447] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 729.308572] ? __sched_text_start+0x8/0x8 [ 729.312748] ? find_held_lock+0x36/0x1c0 [ 729.316854] ? ___might_sleep+0x1ed/0x300 [ 729.321020] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 729.325792] ? arch_local_save_flags+0x40/0x40 [ 729.330391] ? retint_kernel+0x2d/0x2d [ 729.334300] __should_failslab+0x124/0x180 [ 729.338551] should_failslab+0x9/0x14 [ 729.342360] __kmalloc+0x2e4/0x760 [ 729.345913] ? write_comp_data+0x4/0x70 [ 729.349952] ? mpi_alloc_limb_space+0x31/0x50 [ 729.354465] mpi_alloc_limb_space+0x31/0x50 [ 729.358798] mpihelp_mul_karatsuba_case+0x12c/0xda0 [ 729.363836] ? mpihelp_mul+0x5f0/0x5f0 [ 729.367750] mpi_powm+0xfc1/0x1ed0 [ 729.371318] ? mpihelp_mul_karatsuba_case+0xda0/0xda0 [ 729.376519] ? mpi_alloc+0x4b/0x230 [ 729.380174] ? rcu_read_lock_sched_held+0x108/0x120 [ 729.385200] ? kmem_cache_alloc_trace+0x356/0x750 [ 729.390072] dh_compute_value+0x3b3/0x690 [ 729.394242] ? dh_exit+0x20/0x20 [ 729.397616] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.403163] ? __phys_addr+0xa6/0x120 [ 729.406973] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 18:35:20 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) futex(&(0x7f0000000000)=0x1, 0x8f, 0x2, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)=0x1, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 729.412521] ? __keyctl_dh_compute+0xb52/0x1bf0 [ 729.417206] __keyctl_dh_compute+0xdc5/0x1bf0 [ 729.421723] ? find_held_lock+0x36/0x1c0 [ 729.425808] ? copy_overflow+0x30/0x30 [ 729.429713] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 729.435261] ? proc_fail_nth_write+0x9e/0x210 [ 729.439763] ? proc_cwd_link+0x1d0/0x1d0 [ 729.443847] ? __might_fault+0x12b/0x1e0 [ 729.447919] ? lock_release+0xa00/0xa00 [ 729.451914] ? arch_local_save_flags+0x40/0x40 [ 729.456544] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.462099] ? _copy_from_user+0xdf/0x150 [ 729.466263] keyctl_dh_compute+0xc5/0x11f [ 729.470428] ? __keyctl_dh_compute+0x1bf0/0x1bf0 [ 729.475200] ? lockdep_hardirqs_on+0x421/0x5c0 [ 729.479937] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 729.485406] __x64_sys_keyctl+0x17a/0x430 [ 729.489571] do_syscall_64+0x1b9/0x820 [ 729.493473] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 729.498854] ? syscall_return_slowpath+0x5e0/0x5e0 [ 729.503811] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 729.508667] ? trace_hardirqs_on_caller+0x310/0x310 [ 729.513931] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 729.518970] ? prepare_exit_to_usermode+0x291/0x3b0 [ 729.524010] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 729.528871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 729.534080] RIP: 0033:0x457ec9 [ 729.537289] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 729.556203] RSP: 002b:00007f81272f8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa 18:35:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x220000, 0x0) accept4$inet6(r2, 0x0, &(0x7f0000000080), 0x80800) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000180)={0x7, 0x0, 'client0\x00', 0x2, "66dfb93f2981f5a0", "04d0491caa97af479f177bebddfc616c3fa160fae33f1238bbb42dc4582f86ec", 0x1, 0xfffffffffffffffe}) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup2(r1, r1) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000000)=0x1000) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) [ 729.563933] RAX: ffffffffffffffda RBX: 00007f81272f8c90 RCX: 0000000000457ec9 [ 729.571213] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000017 [ 729.578486] RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000 [ 729.585766] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81272f96d4 [ 729.593041] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 0000000000000006 18:35:20 executing program 1 (fault-call:6 fault-nth:22): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:20 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x102, 0xa) r1 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x200002000000000, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084503, &(0x7f0000000080)=""/181) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x1006}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000200), r3, 0x0, 0x2, 0x4}}, 0x20) 18:35:20 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x35, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:20 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x176, 0x0) 18:35:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0xbb) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) r2 = msgget$private(0x0, 0x10) msgrcv(r2, &(0x7f00000000c0)={0x0, ""/49}, 0x39, 0x3, 0x2000) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f0000004340)={'tunl0\x00', 0x7, 0xffffffffffffffff}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000008100)=[{0x0, 0x0, &(0x7f0000008080)=[{&(0x7f0000000040)="d9882c8abdbf18c0ca1d8c66a1eacb3c746d23a3c8febf0ad6e99d7648097e08d68a1c03fd53341ac2d09901b3b817199ddc412c2e338b62082ba315f9ce6912580d17dd8811128d21742f4949be6badabeb8dcb6480b80d8943499410bbb2ee0fbe6f9ef114b14f65b70215493612bc67605e903ac5e5ca0d"}, {&(0x7f0000004440)="7abd0a34fca2ddba7706c9b05dc64e4b1396621be375c11e8977c17ae1deb608a5c4e9bc64f425dfdbc2e0c8f60014f3f3a47c8b7d4c143a385850b5fe46d15e3f32d44aed259bd645756851aad5affbcade8d"}, {&(0x7f0000008200)="c2e84b2098f773a4c71b942e6550519506c3e2aa5a0491e6e0497eeda042fa95b89e67422f15e61af290c6a972015c57d4cb336f843acc52cef76c746c41eec09dd1d93aebba412e0f31458347485b9e215b074f71472961b0fd17aab7fd3d5b89b11ceee8455b649a563b80cee6ab47f1cd606f3355fd6dc69223ec0d12ccb40902a42c2df09ee90026673b7e47f10e8e02e3d23f43c89922694450f121479e06797f9922a249def8f667c494bded029d2026ba89d0c4a3ffb13faaaefd26b267843923329142272c2ed295e407f0f943a502d9f10e0edf5ab5e41ede74c2ee2757c89d52c50b17283864e97da9c56f4aff74c3e1ced240fbe79b83f02fbf1874157a707d9677e83bb4f662a29428f47cb18525c0359e99df2729da2e510f6719f3415e81d6e64d802a01549eea1d51cb275902547bf5e28a9bab8ee2321b5d75bc170d0ef6f51b9a7914139de5a27aea1c966c869d2ace82a10d5ccb847eb9f257880cf625784dbcc07962a414c412f8053212daddc2dba7c50d598df6edf8a6341eeee0b90bf6ec2c98aa66e79bf93ec7c2bdedf70e2b50a2103278f3b414b25700a2dc162c66106b72c258c8ab64a104cdb3b3e572e2dfabaf7ede31992f2ecb54b21c91fb67b9f97fa9bc070a3e8fef964bb05405717176ed3d4390f27dc4a726bae77a5257746a70970ded33318d186b79ecb77c0d2d726f76a6e40a23ff84c5598defd7d09476a5a5b8edd29dd2ec1b4421da5dc6334e4a597e860ae9120529479fa21454a185ec129693463546f4b6212777d6fa4073ce7de01c36318b0480aab752c1c641cacd7fd9cf57b633bb32805eb9cba5176557a18aa98e6563363c2e63fa41f1ea17cf73ad1c1a847dd402e210880c59963aae1aa49faa7db160476127c1f8b46c6d6f805ae94ec2c3d9a3a228ac0cdaed58a005eb55a738cb1701ad782e261d5d9526587bd392d66fb9a672ea0678dc63271629c095243516bdf2b5f80f490d381b2c7e658a788bfd8f3b87071afec1fadde68dbb89bb1440341cc33c4f3e0698d8b16c85349e817fa77a66fdaf1475c0b8ba62b8548b39ab0cb18e1b359674049437033393e6a743253f4e2a5293d781d32054a3df9f39210c0f4ed563018af406e42f606e7f4d8f15df1a56ad816e0a85a4ca8759816d8c0e9209e6338fff33a55c4b26a58b803100c862798a93bdaddd4ebeae99e7cccbae2caf16d6a207590dc8fa35b29e0a16e95bfd640193211913f1fec4bd833378bf3383b8f7d58c83988f4d04c2f075a50b629cdc1ca3824f17fb51b27547c47fdbe6b2991ec7a653016c3deb8ed092546184884ba2fda8be6bf2f1ddf98d842df8c69c976253359ddc8aba3e84a81c3a48cfcd93baebf1d24675ba7553821ebf1b7d1b411311eaed93884d745683fadb02f109bb4a7b8ea9a90b29603a4951d9804a567d2a1625e0327a122a63b92c3e78bf65748d187620b4131634cdc3157297d75bdf25ba4cd1017ddd5bad1d2f29b757c0a2dad47200e14327bf52ec44f5b6cfc695a805f5d97b1cb1b7ba8a0f86f7887fc06341bc72a31b023031c98a05f65a5651505b2733538306ab8036bab9e6f24d8a739cd655a4664781409cb1104030fb9f785634a7052588910bf2ca282fe05afb8ff216ff52156f693bf47c7a26b51aee9ee2e54d1d97d4210a2b7a7fb15c456b65c4de0caba3f6e679f334c89090e8828d94e7bf8edea00df77d0b592fdad625a3bcea6f4bf72f59e802597c82a9f78e8b6f585e41c6cfa3c41646f862bda6c84eedfe438e9873a31b8e4e12ddb06937e167d824cf0186fdf310b80a7ff3345df506794cf65c3aa84e98cfea302db874be9a51914c3379a0ad58c0a5ae1fdf76dde7b52ab88e386617c15e63457b930fe0e16c4bb24dc95b5ed46cec6f1ccd76aa1ec5ae93ddd50642f4351b3886a3b557d74551a9a64f9617d80caf444584a8e428ddfb53a726e64bba57c6c834c7b08bfd91dc3ad4c6b5018d2cc6ef5a87a920e761ba4bd0ace113797ed9bb38c78d8a8e25bb5b9e3c15f4bb257d42882ea5815b90c29bdb456e09d7f728ab61731c0d6c1eecd4a6d9a985840a1d248df4ea15aeaefab18da35d912bf5ca8cb293cdfa2f3f82ff99fbf14a5ea764de1e8613320ebf6f5a937945eb889522de1456c490f541ffafcb830273aee3b09665fb0c3489254316c0de7f8b773eb0d01c8a97b12aa356d7b19bbf506ad317bafdc07260af6d970706a9cc22cc17db23ca61f287c8d548b205038fea119d61554e36de8a6f8a1556dcae03a4afaeed36c699f78ccffef828a60738bf6f32addb9efa31cecdf7fa65c0db1c5a2c4ba487a024aa6331f9de783103d3037be30f1e88d6a285fefe7320619419a24583e295b6f030ae16c0dcd7fd87676c22ff76613af82bce4700c8d65ece6dde7ec11cd798da7f00a88fe445a187c6a4c390dd1af8ebe6b9e3c2c2531b27194536954a4e1f2d6d414a55b4203a1fae505c5424abe7ad23bf102f91986f0236e5c7d9cd1af80d24f6175bdc072fb483716508477e2480bc886f01eca3a6b2fdf6a77673407ee889a11c49b422b6ced6fd96d16d8ba7422e539b9aef4d060b84c1aae756c1b18c4be2b80eaf5dd6aa6ee269c47a99c992afe0860c63e125a91e1d39237a11bf86174563935917dddaa1145dba2de06b248ffd061cf455634e55d18e5963db9313b8cb1f5f442ede6088741ad2f9c467160292185bb26db1971a9562df298ab298b783f149b1c1e9bdf2ee0f32f3ff632c9b4e74c453b9ad03ca5ba23e38fd05f050021499aa6f26f5e545eb2e05615c41bea7dda3e38b6c88d280fb8a5911e2a976e44abffc971ad129a772fc85a5d5c94d54a205a184cd1c3227cf350f5c737538b1e5cb8b2fd584f7f20b441b56499e8e8087daf6b84c9dbd5b688eb3a8f1408d28a65cd5927c4f378200c59b013569fe374f17fb42c5145f01f2615d201f743c5e921e9a8849f855e2690fc57547c5be5aa1286842d61c95f7788ba38ff08d23a42285bb2f65281ccd00e9bae00dcbbaa16ba6aa1af65d6518520e8b4a6b03d5b9a15cf3a6f0239fc0a4a513619b06736839b7664bd8ab83548cf6f5c3255a9ecb68600db77040822b32c33478c09023260e07a08d6fed62a29cfc69ba985ab96a4c6cedfac0e5c2398e501ad6f836be1dfa0ffe6b4a424f129190b6a58607a4f0a1bc1c148e3f8c4e640ba8e2e8842e75e3bedf5e2b34746e2a55923b96057863147fdd9e0b3488552746974a559e447fb2aea2e9fd426376b4271bb330c89e370f6b20983f134180ec45a9ac94d8fa71eb69b0f1ba95956d174b13bb2ea2aa498d033735617465bc55170c45ce42344d8d24b7098b7fdd1cbb3729be826bbcd6b67d2f98f75a8dfbffc00ac70fac1693a50e2962e1631ec444742939c9966cd6eb1fc960e8cc5afceac09a328c9a57715490a9fab174e44aa7fa66c5ede7e82b76e8153df6468eec19068fbe56d53a24d7cc4133618f5dbb4fadd5f3fed8d586ba681f7e671001c05ccaddd4de2758bf8741c1504916b65093f12baee9b102de7c3f3eddccd2b76ae48a541dbc8899bc4b532acdaca9d4ee2d8d955a7a9f0820be947fc91b1d2383a11e54f5683153ec2868388aa1d5902a9460439c3aa5a059185d1dc9dfe2884ea5b98978f4ef707bdaf3f78c2112943d0a46578b550bbd4531e800cac2e33c07699df0e9847cf64d4f2f870451949c34f265737fba06f4191919538c8e8272e961d78d735c10ec44b0ad367c35b4b6f68ab269fb089dd5bcef7ba1a5b118e51f8adf765ea2c7cebcede6618e7548cd4c5d48e0b9a7c9f8e98fee19f3f206574e596d6fae8bab428a53de2bec598b3d0778bc967f4c797a5daa93fba75b7e5c5ea40a8ee3bfb879412c648215dbcc2954cee71548d8b4e1f91b7be7b173e9d75bf6a752c7b55c193b95e28a16884f274360d94e7a785b54021c580b9a0d2ed507b1610556eb9ec616275f21eeb67ebfbf7f0ad9ec50219ca0581562f970640f1e7aae363bd2f8c29b6817c9680b2ff419de5b5f0f7f98df1237f70786ccad60f849b32840108380a00311462cfe3652675cfcd886eefce00bcc2ccd9339dae9c47a89afc91dfe86a7c8bc0350cff1f826117c8bbd3cfb47fcafd146758f7735a23c335ffdd4030fc0269f6d5c3a4686fd6a9e9aa4014d115cc0251cc303da0423646a8daefbdb16860e46f8a473cf231285832cf21a4782f80882772247e7873cc78284a62c620d206bd3f5dc0a7a42a0d3ce44577a2c8f6461f5c56ae135c91314681aa2e22f25368ac575982658337e565d6d3fae9e888f24ab1f805c173c4049f097a44fb2802bce5e8c6c2a6be925b48755042ec124817e46dd89ffb83e1c8a5cdfb714a8e023e21a65ab1027b5a30fa65d20ecd5d73fdaa7f4953ac29ad9a433791c9819552a6661c4b42fa09b8e86de0ea3e018a33f3582da624922baf385b0f140b742e9087304b76f69c9057e24be26ea6fbe579f04e685e23357409ee09af580adad7622efa75d678823b540e893bfb408914840a9266a2f3f764ef09a5b871f21f89a608b472a6e57a00ff689d7e947b5f0f5309f61d28627e5b984ea13f68902068b32a53efeacd7fddd11ef307e8d43011ffc9c0d78a7f5ef99cd80492de61f48e87d4bc3843bb3af82265bf422c16cdb19b425a4b8679f7da78decc60cf8ebf128db6e4f97790c9a1eb4fde070e31eca0f2abfc906e8ea87c98e2f426a14bca80250e5005cb855280c0c039fa5b76cf6a2fc9ec9ccd994e782ac4a616d127d06106d2264bd7de46206fbb2f2adf177ec1b728371fcd2e205a84def8c35f941a72fcb9e567191e009e139fe5f9d426254e3421dd6fe27d479e7802d5bf9f8e3325ac0b6cd4e911228711ef940aa74188cbfae1af62e2a14e91cfef411d3cf3789324b51ef53696692deabec73e1761c0103668c58db63494164898038a107463b97beeca2b2a277200cca0175d133844a023b04ebb48e240c9f19444e2e529053c2459c0969b3ee7bed046b1bed2e3330a4a8a268868815b7d3e690e8a31e9c836227fb1e482b37c3902d1018b8263f6de9305ee571df6093d6e63781869c462bea7bfeb5a610622d279c5c7399e4404c0d6346ab6b3dee1f3c20751d4288e6912d2dc11362f331c866d90ab7a11cb10595341841e51a9421a34feb4a96fda4f818e9d010de263dcc2a5cd4459064bb6528ad127bdf71491e256c96dd17b2ea4377c55c83820e4f891cf7268a7ce6cdba713467ab628954ac021651735c438d6eb72510deaa5ecbaf77a3dd02b4b4e8dbc867ce2c519c8b2186635cdeb399b80509776b44c8452d4ebf8947a62310c69ddb9ca47185e6f9b8beec65f6f57ee0fa6df1e262523cb1d94d88ad040336e4d9936b6c0739a92a3d6b875ff23a0e27cd902ff0ccd6dd2825ad5cbe7a30580e92b30288cea46f11f0477a4007a1bb2ccaa08f6f5d9248dc3da4c616b50fca9d65288689775c9c00fcfaa8e68a5ab92d29c95927cbe61eed7145981497dfae64ff4652d17a7b0270d955529f16af8d0dd9e10484b0bbf1b4b3d6a0305b2eb5c7b423d8b2d7f8c9ae075b599f3f5a4d0cbeb60eae6e33359a552b290c3c9483a88d3f168e295c16f6d2356759949df9ecde279399252847ec5aa8b408ff65d430a8e03b970cb08d6373fd673012fcf65b17a666be40bd32a66d5b84c2fa2016ed9b47274e696c9cbe14ceece4419f0642205e916af303980f6bd6b82c0f"}, {&(0x7f0000008140)="0100000000000000ced883751291732715d34c5c7df6e52df65c5598987befce07e76e8d5c416589145a154be848eeeb661468b1edc58a28915d83a25cfd5cc51720d2ca1404a1c8404490d3bdee3c34d0df02681c462f3f56c401000000f108ceeecf713ccbfb3873beb3687201abe814c330d6ab06372fabf49bbacafb09fa9333866b69e49e85c154"}, {&(0x7f0000007f00)="d33bc01624e55bbf70a03b08e858fa406957102b331d88cc301f1f8dae2d9560827694a5509fa53b701c901eba48f0113a26062f06a47a23ebb7557c57e9154408a01d60aac590f32b4b18ed0066c3d3b88ee9d2d26bc1ad54fcd6c058d681b8b57c31c62741701aa6b2c50006656a583ceffaf70a3feaf58f1b858b990d22b6f8"}, {&(0x7f0000007fc0)="30218d59e75af7d5a4b8cd39249b991a22fdb91aac2254d675a1474ec47b14d6ba012af11c8ede5cab3f1efab14eff821340d57e3fbd698faa93fe9ffc0acc4892b14b7533ee5a8dcfd2acc076b75b83c5b8e19eb20651ccd9f161d9ac0b596560a4abd078bb26da0cf57760286dc0b454c63dcd7c57441181282b8953f97cc2c5b966936f57169d71b5434e35bc16887ef312ac5cfbc1c16c4436aeda225c1aa29f6251115d6dde16f6d4b87048146f41f5"}, {&(0x7f0000004140)="6ad44e0a1f3fe5901b217321e907cd609d90a20404ee187bec79b1cb16ccc99d55"}, {&(0x7f00000044c0)="5f58fde2e05b7902c238988b7d21841d1651b110c40ee4c9af10158ab8a30c7b466d0c1369b99b86799d7c3e6b592951b0c3318096d90939ba99eaf5e756f27d8a4227f251c4637349c99f3999939a6e8a3926fd287b5a288c7ca5f38d6734ae4b55ce87bf27e18797f09070f4713f2fdaef2d54"}], 0xaf, &(0x7f0000006dc0)=[@iv={0x110, 0x117, 0x2, 0xf7, "1df1c0dc4463a374176ebf8abb10de20af3f366e598f480ae0a80df1f97940f4527a5daa309b3cc1967fc3eafa96f7b3ec2ff1f2f1b5c4a77fac2cc791c966e087824da4d415cde4e350794d94fe7cfedb78198b068a3231e8c28fe44321282470f6d82d39f1fdea3a8a897e1d42b5163c43be5b752a4f7aa32a072d263d6604fa98c406b1e7d3ef9cdaa09da6253b600d4500ebbf1584ed7d7cd67be2bb9949b7d6b049da57356fbb9a114bdffc6fa91ac838bf1a001de84cd99f72bb4e48aa1ca72979618b2a7ec4934cb1708d5492db17473d355e53352d04a7b330235a107c4bf95dc7d59c7b80f6ecf57d80432ab71d0c28074d5e"}], 0xffffffdf}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000006c00)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, &(0x7f0000000400)=[{&(0x7f0000000200)=""/15}, {&(0x7f0000000240)=""/150}, {&(0x7f0000000300)=""/215}]}, 0x1}, {{&(0x7f0000000440)=@xdp, 0x0, &(0x7f0000001940)=[{&(0x7f0000000540)=""/243}, {&(0x7f0000000640)=""/161, 0x2e1}, {&(0x7f0000000700)=""/51}, {&(0x7f0000000740)=""/61}, {&(0x7f0000000780)=""/4096}, {&(0x7f0000001780)=""/224}, {&(0x7f0000001880)=""/167}], 0x0, &(0x7f00000019c0)=""/71}, 0xf0}, {{&(0x7f0000001a40)=@generic, 0x0, &(0x7f0000002c40)=[{&(0x7f0000001ac0)=""/15}, {&(0x7f0000001b00)=""/4096}, {&(0x7f0000002b00)=""/64}, {&(0x7f0000002b40)=""/226}], 0x0, &(0x7f0000002c80)=""/118}, 0x990}, {{0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000002d00)=""/90}, {&(0x7f0000002d80)=""/4096}, {&(0x7f0000003d80)=""/57}, {&(0x7f0000003ec0)=""/233}, {&(0x7f0000004540)=""/4096}], 0x0, &(0x7f0000003fc0)=""/208}, 0x3}, {{&(0x7f00000040c0)=@l2, 0x0, &(0x7f0000004280)=[{&(0x7f0000003e40)=""/11}, {&(0x7f0000004140)}, {&(0x7f0000004180)=""/112}, {&(0x7f0000004200)=""/47}, {&(0x7f0000004240)=""/32}], 0x0, &(0x7f0000004300)=""/38}, 0x1f}, {{0x0, 0x0, &(0x7f0000006540)=[{&(0x7f0000005540)=""/4096}, {&(0x7f0000004480)}, {&(0x7f00000044c0)}], 0x0, &(0x7f0000006580)=""/36}, 0x1}, {{&(0x7f00000065c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x0, &(0x7f0000006ac0)=[{&(0x7f0000006640)=""/130}, {&(0x7f0000006700)=""/227}, {&(0x7f0000006800)=""/205}, {&(0x7f0000006900)=""/44}, {&(0x7f0000006940)=""/92}, {&(0x7f00000069c0)=""/254}], 0x0, &(0x7f0000006b40)=""/186}, 0xffffffffffffffff}], 0x1, 0x0, 0x0) 18:35:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x8001, 0x200000002) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000080)={0x8, 0xfff, 0xfbb6, 0x8}, 0x6) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r3, 0xc0405519, &(0x7f0000000000)={0x4, 0x7, 0x351, 0x0, 'syz1\x00', 0x6}) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000006e40)='/dev/vcs#\x00', 0x9, 0x20002) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000006e80)={'veth1\x00', 0x0}) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000006ec0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x60, r5}) 18:35:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:21 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r1, 0x2, &(0x7f0000000000)) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000080)=[{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000040)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x192, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x100000000, 0x2000) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_rose_SIOCDELRT(r2, 0x890c, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x27, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @default, @default]}) 18:35:21 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775ce05e381e5b3b60c79e3fed3aa81ed5c54dbb7", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:21 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xc8, 0x0) 18:35:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0xe, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:21 executing program 5: set_robust_list(&(0x7f0000000140), 0xfffffffffffffdb1) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x9, 0x32, r1, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:21 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000140)={0x5}) 18:35:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x43) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x8, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:21 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x14, 0x0) 18:35:21 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup3(r1, r0, 0x80000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000000), 0x8) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x2, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:21 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:22 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x2e, 0x0) 18:35:22 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20080, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000140)="504b7636b36584ca40dd1d55061649364b4854d443b30172b81be8b27b016071074ea19005fca05f878cd921914da06cc555a2973ab13f1adf1907f75d8263a26fe431698f3e377a8373b8b0af0b72e5e1bc947d16366a53c94773db767606ea9e2c4322496a60b17d0836") socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x39, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:22 executing program 0: r0 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000000)={{0x3, @rose}, [@rose, @default, @rose, @null, @remote, @default, @null, @default]}, &(0x7f0000000080)=0x48, 0x800) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000180)=""/82, 0x9d7}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x2b6, 0x0, 0x0) 18:35:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="99a62257b88d6e9918a392bd82b63121718c7facf57f0b4c5290e8a13576ef11af9e6f9e36b79a6db4a736a2a89e97104a8ed3372823d11f3e33f271712b539aa5e1eb96c6ca399b60603a625a975e281d6c2b237df75b80c429259b2acc340d48d2f9067b5f9ae6b1623ff7a0149876d0dae6d630cf420da709eb611e2d1e49edc1808a14aa7e31425c60e07f68bd383e78646b084158d432c182", 0x9b, 0xfc}], 0x6000, &(0x7f0000000340)={[{@fat=@quiet='quiet'}], [{@uid_lt={'uid<', r1}}, {@measure='measure'}, {@measure='measure'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@subj_user={'subj_user', 0x3d, 'lrw(serpent)\x00'}}, {@euid_lt={'euid<', r2}}, {@obj_type={'obj_type', 0x3d, '%'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@subj_user={'subj_user', 0x3d, 'lrw(serpent)\x00'}}]}) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000140)=""/181) 18:35:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x5, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:22 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xbb, 0x0) 18:35:22 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x4000) sendmmsg$alg(r0, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:22 executing program 5: r0 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000300), &(0x7f0000000340)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x4, 0x400, 0xa, 0x1}, 0x3ef) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r3, 0x10, 0x70bd25, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) ioctl$EVIOCGKEYCODE(r1, 0x80084503, &(0x7f0000000080)=""/181) 18:35:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000001c0)=0x1) getsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x8000, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r3 = getpid() process_vm_readv(r3, &(0x7f0000000600)=[{&(0x7f0000000000)=""/79, 0x4f}, {&(0x7f0000000540)=""/155, 0x9b}, {&(0x7f0000000080)=""/26, 0x1a}, {&(0x7f0000000440)=""/73, 0x49}, {&(0x7f00000000c0)=""/62, 0x3e}], 0x5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/38, 0x23}], 0x1, 0x0) fcntl$setpipe(r2, 0x407, 0x100) 18:35:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 18:35:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x14, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:22 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1bd, 0x0) 18:35:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x7, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x7e) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) membarrier(0x41, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000000c0)={@mcast1, 0x75, r3}) r4 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000080), 0x4b3, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) write$binfmt_script(r0, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0x1019) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="b24d356ad97b943cd68728e1b015de456014012f4075bcedc556afac941f0d080bb490ea4b76812b496e59a14e0ad15863ec5a255de59b2425cdd9383fddfb38dd45a53c24864c7c9b1ed9fc270b66ff3d", 0x51) recvmmsg(r4, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b005e381e5b3b60ced5c54dbb7", 0xfffffffffffffe6d) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:22 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x4000000032, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000140)={0x4, 0x0, 0x2021, 0xffffffff, 0x1, {0xb52, 0x44b5}}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) write$binfmt_elf64(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x79b8a85c, 0x8, 0x80, 0x1, 0xad3, 0x3, 0x6, 0x7, 0x1ae, 0x40, 0x333, 0xae, 0x8000, 0x38, 0x1, 0x2, 0x0, 0x7}, [{0x7, 0x4, 0x4, 0x8001, 0x80000000, 0x8, 0x6, 0x3a3}, {0x5, 0xfffffffffffffffe, 0x7fff, 0x1, 0x8, 0x4, 0x8, 0x3f}], "4ee062a7020a16cb064fa5f608b000978259d5ea1a8baa3c9ae9b7aa38eb20cdf18f249d4c0b1be5c5c42a1971b3362002d64768e3b212f53050a5926b1e875544b36a8a9b1e83", [[], [], [], [], []]}, 0x5f7) 18:35:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x20, 0x8000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @remote}, &(0x7f0000000080)=0xc) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="0a0775b005e3814804000000000000b7778db77a322688ca09563560ad718d9b9601b41c3bd0726c187fce41e0e956f1826705000000000000269064b22b3eab36179fdb8fd2e0f6f20fba86eea16140963f0590832b063009a6408d32e161887cf1a22860d31a5374e148809dc87e", 0xfffffffffffffe49) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x2ef, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x13, 0x6, 0xffff) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {}]}) write$binfmt_elf32(r0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0xa2f) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000080)={0x0, 0x4, 0x100}, 0x8) 18:35:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0xa, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:23 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)={0x8, 0x14, [0xfffffffffffffffb, 0x8001, 0x3ff, 0x3, 0x200]}) r2 = socket$inet6(0xa, 0x80f, 0x50b6) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000200)=[@in6={0xa, 0x4e24, 0x3f, @remote, 0x8837}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e22, 0x14bc, @dev={0xfe, 0x80, [], 0x11}, 0x4}, @in6={0xa, 0x4e22, 0x100, @empty, 0x401}, @in6={0xa, 0x4e20, 0x1000, @remote, 0xef}, @in={0x2, 0x4e24, @rand_addr=0x7}, @in={0x2, 0x4e23, @multicast1}], 0xa0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xd139, 0x4000) ioctl$TIOCCONS(r4, 0x541d) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:23 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xac, 0x0) 18:35:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='erspan0\x00') 18:35:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x10, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:23 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x18000, 0x0) ioctl$RTC_WIE_ON(r2, 0x700f) 18:35:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) getsockname(r2, &(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003a80)={@local, @multicast2, 0x0}, &(0x7f0000003ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000007a00)={@initdev, 0x0}, &(0x7f0000007a40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007b80)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000007bc0)={0x0, @multicast1, @local}, &(0x7f0000007c00)=0xc) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) accept$packet(0xffffffffffffffff, &(0x7f0000008000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008040)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000080c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000008100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008140)=0x14, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008300)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000008400)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000008440)={@multicast1, @broadcast, 0x0}, &(0x7f0000008480)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000084c0)={0x0, @rand_addr, @remote}, &(0x7f0000008500)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000009740)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000009840)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f000000a2c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f000000a280)={&(0x7f0000009880)={0x9c8, r4, 0x0, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r5}, {0xf8, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x254, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1d7}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}]}}, {{0x8, 0x1, r17}, {0x1ac, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xc5d4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r18}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r20}}, {0x8}}}]}}, {{0x8, 0x1, r21}, {0x134, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x57d5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffff0000}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}]}}, {{0x8, 0x1, r24}, {0x230, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r27}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r28}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}]}}, {{0x8, 0x1, r30}, {0x128, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r32}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x7fff, 0x9, 0xfff, 0x8661}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}]}}]}, 0x9c8}, 0x1, 0x0, 0x0, 0x880}, 0x4000) 18:35:23 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x4e, 0x0) 18:35:23 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) socket$l2tp(0x18, 0x1, 0x1) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x1, 0xc5, &(0x7f0000000140)="588cc6d2be2fdfd17080cc80c2b3e1baaeac04856aa25709bc2452e6b949a8daeaea7a8ac8124b850c7660b192752e5825044b96ea9ff88b64f155b4b001deeb01c3c794a7b9b5e31ce63f6ef0dbfee063f5c82057d6ecd5f92f4011724d32e9f0dfe3fc99b346de68c3292d5d9a23489d113932399640b1a5d4acf343e7f2c5a3f261a172f3d09c820a98a88e68d13dc12fdc6849d4058f652134e2c0335c54d35dc43f9aed335917668be11d528c8d47e712c5eba2488b1e6a0b76a1cbd9164902f0a9f4"}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2800000000, 0x200800) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000280)=0x1, 0x4) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f00000001c0), 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB='4\x00\x00K', @ANYRES32=0x0, @ANYBLOB="00000000000000001400120010000100677265746170000004000200"], 0x34}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000240)) 18:35:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x72, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0xfffffdf3) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}, 0xfffffffffffffff9}], 0x1, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f00000000c0)={0x200, 0x1, 0x0, 0x2}) [ 732.371829] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24346 comm=syz-executor2 18:35:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000031c0)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)="d5ebb7e8f4ccf77327e9c557d0ca2f3ec7c36dbeed0423d67678bd254982c66e7c820555840fda0f577a11b09b22bbc07ccbf847fba2ffe06b0d08b9c8d691f508c0c12c6028a7a255ad84388828a02bb2fefc3b7538d2c2a850b00a701266599cf86875dbafddf0068544ee4337015e885ffec5c6df0d4c9856ec2dbb0af1aa6dd073f0d9f3f2f52ac8c30b3bcca3ae9d0914c306125e7ceabd1914af47b2", 0x9f}, {&(0x7f0000000180)="fa78640467ecf3c50235fe864ae4521caf1c42ee0b81c8af0dfd98a66a485a077a173eafa73587187340523c553c183bddbf7defd312bfd6643ea4410ad92f1a695776f9cb7a87", 0x47}, {&(0x7f00000000c0)="2113e1a9bd0225c75e23dd9a4d83bcf86e0a9569914cc74223a511f3e178106f1b67aa", 0x23}, {&(0x7f0000000200)="4cd2c5c0423b9280718838f01c947235beeac9a02475a5206ed3e1123c955f8750e7597d6a934d912175d5f89e0425b535cda1e5a62a49609a0027328ad5668b6191af0aac5fca7ff1bcbc79525ea9d5f1fef7023b477046b4c84360849fb13566af2a069bbacf7e52fa73e87b5d4e96a2bdf2f567220d625cd4170f9d5ce97847de07825e7c87b7636a", 0x8a}], 0x4, &(0x7f0000000540)=[@assoc={0x18, 0x117, 0x4, 0x80000000}, @assoc={0x18, 0x117, 0x4, 0x4}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}], 0x1048, 0x4000041}, {0x0, 0x0, &(0x7f0000001880), 0x0, &(0x7f0000001900)=[@op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}], 0x60, 0x40000}, {0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000001980)="c0e367c71745bea306de7101fac836c3f26ca84fb8d709a26905aa0893381f7a8bfe1bafea4bcb8f715b821fca427b6caa5647ba183317afb99e59334353f16eff89b8440b973819acee3cfd9166bae179152f8a55278a4555fd4cf82ff63d4326d653a64b301f2a5ec94efe8121967a59a2f4fcea2266b5e3e149533c82e2078624e2ee3fc896aea839fa9c9fdd18a5c5bd3727027f3ee507620297d7eed5c5999e36e385764cb436c5584a3939cace6f846d6e7d6ceaefc9a4a9acddc36ddebef111b810423e676049f272af1817890aaa0b00a70b6df13e84988781b4e38138b8e6693aa80471fdb3f7", 0xeb}], 0x1, &(0x7f0000001ac0)=[@assoc={0x18}, @iv={0x18}, @assoc={0x18, 0x117, 0x4, 0x2}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0xc0, 0x20000800}, {0x0, 0x0, &(0x7f0000003040)=[{&(0x7f0000001b80)="2f73c2e26fbb0905d020cff79be47280e163f8825779b5c7e249f71aca6955d1bb01292a7938453d9d2ba7acbbb913f22349e6dfce716f62f708e9147b627bd2b245010c375050396509853bf5ede254610a416f1198564fa9c0d1982cbcddff9a574d", 0x63}, {&(0x7f0000001c00)="8e74b346c96787fbd618e800183a3ef43f4dcae7ace785f549d3019fc39aaa5507959c11dffb2d151f67014579e7954e2d6a0e2216a24b44b103fd42a1cac841e6d04cb76a065973d458fd6e98cc76330a57d8ea04110b0765d65837278d78f55f6edfac1d60bc5fb42edfece8bfb6aeda549d9abd1ae308593da41df4bc5740360daec3bc7fc714af2e5c0f2bbd86404ac476611c406d2968a64b4900bdb973ede1d3bb27f25aea2a54449f50ce5b569cea5251e74a0105", 0xb8}, {&(0x7f0000001cc0)="0db6bf7fa9c2ca516ae8b33f3087272bf96592dc1c86f54c18f4cdf2f906feb206b0aef6132f1368d679ea0e43983fc51fed50c50f59f2a26ab48ece2d0d5de06026f15a5d63e5c00443f0636f384aaaf19f0709c0d03e2d52a0fdabdaed451771b85d46d62d58f9b824a979ebb02a4d17ce4defd1e04cea995ed72b2352628dd8992033c66e57c8d87015236cda2b5da0369db4eaa89bb32e00be43db55dbde2250860c3fcab80012e5a1b0e81f0a9c156e4e8ff834447642aeb437aa347ac87d23cb452cfb8e8b62f307541dd328ad288a623ac42a26d6536d685d8a818dec4e20e4cdc87fb224c0548ff08641f2b0f65500", 0xf3}, {&(0x7f0000001dc0)="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", 0x1000}, {&(0x7f0000002dc0)="4bc5171c442d6bf5cdedbd75cf585dd42a1eee291e7e6911c605d925ecdd31e0520b7bd512521126df567eea3b1b33c5f5a8a1882c564f455dfc5a4e1701ab9ce12e7a1e5321ae25ea26ffb0fc71691581251e403836645997623a8aa1062c0e82bff7fbe872095787bb37711114567666a0f1b545b1cef07976750894d00c54ce7306", 0x83}, {&(0x7f0000002e80)="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", 0xfd}, {&(0x7f0000002f80)="54e3e6d163aa1c97b81c9b2e546ec3798beb0b72ab08e4640b9cff54c81c33918e30e36a782df6e449f2be3d9afe170a0e7d7fb88d92de4a6d345fbb56d23a0b5f9887d2117d5862d45e370419c9f54fc54afe3f986238efe8074a053c01d0968617d4d67b3cdf369b3772769cc565b43190bb4a69a7492915e3a4aef6af5f8d346dac2b3b629bad54ba37d763f7b637867b2d912be48b50a9", 0x99}], 0x7, &(0x7f00000030c0)=[@iv={0xe8, 0x117, 0x2, 0xd0, "d0e018cfc24e26856f5e5851cb859fe0892dbdee5bf954ed63508ecf6f383432b1f06e70428f4993da126b02545f49bf49bbd15b2eb7f1ec35d63bd42e1fec89036348cc8f68238794e428dc49f406bab541ce3738982414c9b0bab41faaf0ef38686497a88200c31e264b92a37e311d72deb2df41207babc7349a4a154ca890719e76120b22a8794e7a8dc21e94005298ea26931df4193423f3ccb2b638837021629638b7299ea634c0d4d551709c8309fcd80efcdba64d65b6a3d23d34e4c71485d84d0a4dd6d7f70404f5268724d7"}], 0xe8, 0x40}], 0x4, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f0000000300)=""/198) 18:35:23 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:23 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x193, 0x0) [ 732.458426] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24351 comm=syz-executor2 18:35:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x2000000000, 0x1) r1 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x6, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xd) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) ioctl$KDDISABIO(r1, 0x4b37) fcntl$setflags(r0, 0x2, 0x1) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x30b000, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000140)) r3 = semget(0x3, 0x1, 0x200) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000040)=""/55) 18:35:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x6, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40200, 0x0) 18:35:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) listen(r0, 0x75c500000000) 18:35:23 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x86, 0x0) 18:35:23 executing program 5: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000409000/0x2000)=nil, 0x2000, 0x9, 0x12, r0, 0x0) 18:35:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x161001) ioctl$KDSETMODE(r2, 0x4b3a, 0x81) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) keyctl$session_to_parent(0x12) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='skcipher\x00'], &(0x7f0000000380)=[&(0x7f0000000180)='lrw(serpent)\x00', &(0x7f00000001c0)='lrw(serpent)\x00', &(0x7f0000000200)='skcipher\x00', &(0x7f0000000240)='lrw(serpent)\x00', &(0x7f0000000280)=')ppp1#wlan1security-)\x00', &(0x7f00000002c0)='skcipher\x00', &(0x7f0000000300)='skcipher\x00', &(0x7f0000000340)='skcipher\x00']) 18:35:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0xf, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0xc0200, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x4e23, 0x2b6, @remote, 0xfffffffffffffe01}, 0x1c) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r2 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="c0d2031961e8efe9e34805664daa8de6397a394d0c2474cf5cb05965f5f1a58ca9593e5748ee82d40df40d2e8b2090781efc1fd5cd9a0255cf87a06a57b34e8d7b22bfb0a11a79afe7338400172da99b8e5585c9b05b4ea5ae75c892eecf4768e421e077b485d605108aa816828bbeca160ae927938b30f17ed2db48691984bf67b06e65dde8ac59fe3a06d0c42f7fcc784debc5f3988c79a452cdbc341cbe9728988e948d93b941fb02fb33a35ba83c5cf14fb1d2686d17647372b0b58821d55c37d0656c44", 0xc6, 0xfffffffffffffffb) keyctl$get_security(0x11, r2, &(0x7f0000000280)=""/122, 0x7a) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000400)=0x1) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x8000, 0x0) write$P9_RXATTRCREATE(r3, &(0x7f0000000340)={0x7, 0x21, 0x2}, 0x7) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) socket$kcm(0x29, 0x2, 0x0) 18:35:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:24 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xe2, 0x0) 18:35:24 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) r2 = fcntl$dupfd(r0, 0x406, r1) openat$cgroup_ro(r2, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) 18:35:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) getpriority(0x2, r2) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x1d, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20000, 0x0) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000040)={@bcast, @bcast}) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x8000, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) splice(r2, &(0x7f0000000080)=0x50, r1, &(0x7f00000000c0), 0x3, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:24 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000780), 0x100000cf, &(0x7f0000000100)=[@assoc={0x18, 0x117, 0x4, 0x2518ac9e}], 0x18}], 0x0, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x81, 0x8, &(0x7f0000000640)=[{&(0x7f0000000180)="cc97a191535fc4f6618c2efd5f14fffc1fc2cada189336d8ece2aa71a6f73e068152d126acf75d5300914af813313be3940458bd42bbb666eb4f086fd7efaf06760cb48c6753e01d3aecb8d5e2b294ef4604e964c1657fdffc8099186e1f37c342249b1c144933db947c6a44e39d36d31a5a2c8d4a9960ed5f996fc574c7cdb0e213a1a8451f2bfb5f49e14b95e932b511d77855257d69c56ad8bb", 0x9b, 0x2}, {&(0x7f0000000080)="f6a0618cac9f215148cb0d02f3e0a8aeba3bb0f1bf4e8e73716fccba1eca0853f0665e35d74cb792a428ad725f4ab6845dbab1523cf1c3a05743b00f8adcbba393992f2bf59dd11e7d55bccd8ea5d7aa79bcdefbe87a531effd189c2ee9c9fe81e4cb114977228028132f169559a5580b64b81", 0x73, 0x100}, {&(0x7f0000000240)="322647b266490b3505158acb24caec51bf72a0cc681ecf3c69fbc9139d6da08d80b571", 0x23, 0x8}, {&(0x7f0000000280)="8d7f6cfc890c12a2d228c3ec0fd87443b372a3e17489e754c31c555a01456f7bb80a7d75bebc84ee661462cf01dc5eb9b3e186b81aba953bd70f80b3b22154cc8b5643688f304a1b27d37cdd7e54db98fba89ab69516fad7e31fc7a3c9a5e2638c71c982bd4a1d921d9cbe4a8477d62acaccd1ae12f7140207f9f78304173884e8d8aa5906e266bff514d3a9dd280465e4997f43314da1921315fa7b97424f68", 0xa0, 0x20}, {&(0x7f0000000340)="f80e690e48d119537248f4f8f3cb2881cdd69aab4d718c2974c43480f572f0c080a7739ad00f3bbb575b062dea900987d8fdd5d58298c8420f60b261c772d3648298d2f5ed36c96429960523bbed96be3dbed903e548ba6b3379d7c758048c8ac9017dceefef1fea274bc18872a7de3973ba164bd4ced6cfe27002f5748506178ef66dee371e5b5e637c236cfdc20640383b0ec75e2f5f4afeda99e9559e2a3f30cdc36f68883f1b94c61b573e37c128db60e4305f711584b37e7d68290541dccc8489094884dee4268938a2f50d60b6b8b9d294b7526ba63510b54c49cb2e5c3387411c6405981d589d1f21d39248d297bc18c9082364afc5e5142c", 0xfc, 0x10001}, {&(0x7f0000000440)='\b', 0x1, 0x6}, {&(0x7f0000000540)="6a8839f2986ff5bbe7f26a9c3d55f6ecd474d73c09868c6b9cff009be491ef9ebf7b43b0e605a8711dc6cd5f8009798c34478de492af2711745c699a5311c2eca42d77f81bc8feeb8a08e8e27e53d3b161c44037fa9dd4ec609bd86b05039ab5f4a474a816b392666218226c593c2add0cfd5eefbe3c59e30229cf05936d25289accb97dd702a3f34ca927822d69752c7063d2a8570a4b305af972e76c7a26690a0f81621e8b59c30915bf88904f276ae009e9ebc86fbca4a325882795f206507ec95d312685cf78c33de9619b48f426e374741888baaff371064d2ced2b70e284a3", 0xe2, 0x8}, {&(0x7f0000000740)="91ef60c02d4f6beeba1c4f743b6da4a01f0c4a7c7b2b273ce6d2322f34c4db64952b0bc015404d758824f73d1de7cce5b2", 0x31, 0x2}], 0x1000000, &(0x7f0000000700)='{keyringem1-vmnet0!\x00') r2 = syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x800, 0x40) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000780)) 18:35:24 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f00000004c0)={0x32fb, 0x1, "2184a7b900945166a5e43a3a70ea72e0c1db55490fcb3f75", {0x2, 0x6}, 0x8}) r1 = userfaultfd(0x800) write$binfmt_aout(r1, &(0x7f0000000140)={{0x1cf, 0x10001, 0x4, 0x7a, 0x2b6, 0x100, 0x28d, 0x5}, "32bbedfdaa4291f4364eb59b93bbdf8ec82711c2ff995e842ea6d34c5a4d0c82c5be27df39b94ef300f8a9c8", [[], [], []]}, 0x34c) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000c5e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x80010, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r2, 0x40084503, &(0x7f0000000080)=""/181) 18:35:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4400, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000040)=0xb73, &(0x7f0000000080)=0x4) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:24 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x12f, 0x0) 18:35:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x12, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:24 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:24 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x146, 0x0) 18:35:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000140)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x3, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 733.752594] ceph: device name is missing path (no : separator in /dev/loop3) 18:35:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0xe6, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(rfc3686(ecb(cast5)),digest_null-generic)\x00'}, 0x58) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000200)={'filter\x00', 0x2, [{}, {}]}, 0x48) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000004500)=[{{0x0, 0xa22e142d818ece6, &(0x7f0000000180)=[{&(0x7f0000000000)=""/229, 0xe5}], 0x1}}], 0x40000000000028e, 0x100, 0x0) [ 733.908081] ceph: device name is missing path (no : separator in /dev/loop3) 18:35:25 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x300000c, 0x10010, r1, 0x0) 18:35:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x2, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000080)=[{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)="25d38ac7e5a4316918b256bb387d49b949bbb543620a4ead2b41decad2d539378be7cff2969a18394b0ff50fdc73a45d0cdc75ca15bd069d304b4c3024cc511287c74662d0165acd89d5c7a7592bfa31bc3325f9bf725f39ec93bef556e5f8c16f7ab885cc631b13b11f9c9d5e1086457924f42e8f23b788ea660b21c523a0676e7def88ec135c027479680beda6324d15df8b407ae1d8c672f76a1a4eb87be2a59351125b02862803659b2e5747502fc33132ef5ae8c7d06a3d"}, {&(0x7f0000000240)="53dd60045f964774f7cecca7093ce05af746b44a789c6650b3005810132f5742080997fba4cecefa34b51bffcc05bb737f72d8c5a370a1ed418b1e8d27f296f919ac016fd4b605a3824c9016015eecf04a3f05434c687dcd3523fac74ad9dc8bb14186a2aa56fd3888eec32244c99879c5"}, {&(0x7f00000002c0)="b8d5fa62781fbb7728f62f724ca4364c6d9da21a81acc0ba7fc0889dc86d701ed143c18df752409fbb05fc6b34908f5dc7f33b390de7e85ee4d1dbdc22cbaa7facc509d3d752f7817fdeaa3c23000b1e2419dfa1e4816c1801c1cf4e73fba1c8bc20a1df0633a55ffcd992fd6421281a186f1b362b9479ecf858952b1dbd5a5dd569c959"}], 0x390, &(0x7f00000000c0)=[@iv={0x0, 0x117, 0x2, 0x0, "a056a2ebb04c25b57b18"}], 0x2ac}], 0x1, 0x4000000) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x2) getgroups(0xa, &(0x7f0000000040)=[0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee00, 0x0, 0xee01, 0xee01, 0xffffffffffffffff]) ioctl(r1, 0x21a05303, &(0x7f0000000100)="de62a204cfd19e4ca38aed7930919ae9af00a76263fc471cc6ba6aba2c1ef35df7e4bc904e60ab076a3906b163a474") ioctl$TUNSETGROUP(r2, 0x400454ce, r3) 18:35:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$RTC_WIE_OFF(r2, 0x7010) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000040)={'ip6erspan0\x00', 0x400}) 18:35:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x0, 0x40) socket$nl_xfrm(0x10, 0x3, 0x6) mmap(&(0x7f0000a14000/0x2000)=nil, 0x2000, 0x0, 0x10000008010, r0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0x80000001, @loopback, 0x9}}, [0x81, 0x80000001, 0x7, 0x2, 0x2, 0x5, 0x80000001, 0xbab, 0x9, 0x9, 0xffff, 0x2, 0x2, 0xffffffff, 0x2f5d10ed000000]}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000240)={r2, 0x4, 0x8, 0x100000001}, 0x10) 18:35:25 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x112, 0x0) 18:35:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x19, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)=ANY=[], 0x0) sendmmsg$alg(r2, 0xfffffffffffffffd, 0xe, 0x1000000000000000) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:25 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000200)={0xffffffffffff5a76, 0x6, 0x4, 0x0, {0x0, 0x7530}, {0x2, 0x1, 0x80000001, 0x3f, 0x8, 0x3, "10e9cbc5"}, 0x8, 0x1, @planes=&(0x7f0000000180)={0xb3ea, 0xffff, @userptr=0x1ff, 0x4}, 0x4}) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000140)=0x3, 0x2) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000240)={'nat\x00', 0x0, 0x3, 0xc0, [], 0x3, &(0x7f00000000c0)=[{}, {}, {}], &(0x7f0000000180)=""/192}, &(0x7f00000002c0)=0x78) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha256\x00'}, 0x58) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x200, 0x0) ioctl$KDDISABIO(r2, 0x4b37) 18:35:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x13, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:25 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x40084503, &(0x7f0000000080)=""/181) 18:35:25 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xd1, 0x0) 18:35:25 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000000)={0x1, {}, 0x7, 0x8b}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x81) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:25 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x121000, 0x0) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000140)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x301000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff000, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x1, 0x4, "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", 0x50, 0x80000000, 0xfff, 0x401, 0x8, 0xffffffff, 0x0, 0x1}, r2}}, 0x120) 18:35:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0xd, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:26 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x2b, 0x0) 18:35:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "7ab5eed94a120b554688ba13293cafa3b1155a56"}, 0x15, 0x2) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:26 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x47) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x1ab, 0x400002) r3 = getegid() fcntl$setpipe(r2, 0x407, 0x2531) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0)=0x0) setresgid(r3, r4, r5) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x1b, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x40) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000140)={@empty, @empty}, &(0x7f0000000180)=0x8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x40, 0x0) 18:35:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000000)={'bond_slave_0\x00', 0x7}) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:26 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xe0, 0x0) 18:35:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x1c, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) io_setup(0x1000, &(0x7f0000000000)=0x0) io_pgetevents(r1, 0x7, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0xffffffc2}], 0x161, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:26 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x10, 0xa, 0x8, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000380)=""/210, 0xd2}, {&(0x7f0000000080)=""/103, 0x67}, {&(0x7f0000000480)=""/220, 0xdc}, {&(0x7f0000000580)=""/232, 0xe8}, {&(0x7f0000000680)=""/76, 0x4c}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/69, 0x45}], 0x7, &(0x7f0000000880)=""/124, 0x7c}, 0x40) read(r1, &(0x7f0000000200)=""/177, 0x20) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000000900)=""/131, 0x83) syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x2, 0x2) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f00000002c0)=""/181) 18:35:26 executing program 2: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x2, 0x10) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000000c0)=[0x9, 0x1]) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) fchdir(r0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000200)=""/181) 18:35:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x50b002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='skcipher\x00', r3}, 0x10) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:26 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x19, 0x0) [ 735.514892] audit: type=1400 audit(1546194926.647:67): avc: denied { create } for pid=24591 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 18:35:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x4, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000000)={0xffff, 0x35377f5b, 0x2, @stepwise={0x8001, 0xd7, 0xff, 0x0, 0xd2ec, 0x7}}) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:26 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x47, 0x0) 18:35:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) socket$vsock_dgram(0x28, 0x2, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0x8, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f0000000080)={r3, 0x8}) r4 = msgget$private(0x0, 0x600) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x8) r5 = socket$netlink(0x10, 0x3, 0x400000000004) write(r5, &(0x7f0000000140)="2700000014000707030e0000120f0af010000100f5fe0012ff000000078a153900050000000180", 0x27) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) recvmmsg(r5, &(0x7f00000002c0), 0x43, 0x2, &(0x7f0000006700)={0x0, r7+30000000}) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000180)=""/156) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0xc00, 0x0) getdents(r2, &(0x7f00000000c0)=""/45, 0x2d) ioctl$SIOCRSACCEPT(r2, 0x89e3) ioctl$VIDIOC_DBG_G_REGISTER(r2, 0xc0385650, &(0x7f0000000280)={{0x3, @addr=0x6f1}, 0x8, 0x8, 0x9e6}) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/127, 0x7f}, {&(0x7f0000000200)=""/76, 0x4c}], 0x2, &(0x7f00000002c0)=""/153, 0x99}, 0x40002000) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f0000000140)=0xfffffffffffffbff) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x15, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:27 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mlock2(&(0x7f00000dc000/0x3000)=nil, 0x3000, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8003, &(0x7f00000002c0)=0x6d7e, 0x8000, 0x5) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="27655d8ab928b5ccd202efbc3c9183a10f43de344bdc57f2d52968f755df0f684a01d4c2a787c6fda60107c216cc7a843608b049683d3178ecceae0910a453acd0abe80a7a74787f230f674e87f4a5507b4b3c747ec266dd86cad145cf5eda991f2e0d7f6c8e0d6601f3b952aa015f181430465d0b087aa4d0f692bffb431f9862eac664719150b49d0d2099fab4d1da94f0d508ec9b1a4fa7a9cf711d5d42b7852581fde24015829ad74369", 0xac) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000180)={r0}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0)={0xc635, 0x5, 0x0, 0x2, 0xfffffffffffffffb, 0x3ff, 0x4, 0x3, 0x0}, &(0x7f0000000200)=0x20) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000240)={r2, 0x8, 0x400, 0x1}, &(0x7f0000000280)=0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x40, 0x0) 18:35:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400000, 0x0) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000200)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x101}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f00000000c0)={r4, 0x0, 0x0, 0xffff, 0x1ff}, &(0x7f0000000180)=0x18) 18:35:27 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xa0, 0x0) 18:35:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x9, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x80480) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0xa0800, 0x0) 18:35:27 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x0) r3 = request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)='/dev/adsp#\x00', 0xfffffffffffffff9) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="f3fca53061f9531f87a20c16a92f62b5013a096b2a24690feab05e89d0abe042b88b0ed15d8fe131e9568f02091a9011691e78d21dad83d70797493904dfd713", 0x40, r3) openat(r2, &(0x7f0000000140)='./file0\x00', 0x40, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-cast6-avx\x00'}, 0x18) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x141000, 0x0) connect$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0x9, 0x5, 0x1, 0x19, 0x0, 0x8}, 0xfffffffffffffffa}, 0xa) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000002c0)="4038a71d47f170870f8eb7cab20e8bf5275970dd944b3d4826313ca3a3aab45da04fd8fa03cc026cb1b92252b1f7bf707884d6f173a1db24d07298898f74cdf97a00755233c124712b3a3df1ad5a01e7ab7316f484f61fd3df9ad43eea2f350babcaf77aca85c2a6e470ab9c28e1eb06da17cb57f9fa40063f3c597a3775a6bc951122e971") setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x3, &(0x7f00000000c0)=[{0x800, 0x10000, 0x100000001, 0xfffffffffffffffb}, {0x0, 0xbb, 0x0, 0x3}, {0x100000001, 0x0, 0x2, 0x1c00000}]}, 0x10) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240), &(0x7f0000000280)=0x4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) recvmmsg(r1, &(0x7f0000004500), 0x29a, 0x0, 0x0) 18:35:27 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x240, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000200}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xf8, r1, 0x120, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xbb}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER={0xa0, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xb9}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x54}}}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd7b68b1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ddb2f86}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x81}]}]}, 0xf8}}, 0x50) r2 = socket$alg(0x26, 0x5, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x3) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1, 0x0, 0x3f1}}], 0x1, 0x0, 0x0) 18:35:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x7, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:27 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x186, 0x0) 18:35:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x200, 0x4004) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f0000000140)='eth1%*ppp1GPL-\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000200)=0xd783f3f37c0e53b5) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000300)='net/hci\x00') ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x4, 0x1, 0x300000000, 0x9, 0xb, 0x6, 0x100000000, 0x9, 0x6, 0x7, 0xec41, 0x9}) 18:35:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0xb, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:27 executing program 5: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) fstat(r0, &(0x7f0000000140)) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084503, &(0x7f0000000080)=""/181) 18:35:27 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000240)={0x0, 0x7, 0x3, 0x36, &(0x7f0000000040)=""/54, 0xbf, &(0x7f0000000180)=""/191, 0x53, &(0x7f0000000080)=""/83}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000280)="92", 0x1) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f00000000c0)={r3, &(0x7f0000000540)=""/4096}) 18:35:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x2000000000, 0xfffffffffffffffc) syz_execute_func(&(0x7f0000000140)="c48241a7556bf22e47d9d0c4e1be5e84221082958bc4c19014dfc4e219b6c9c4e16e5f7700652e36f3440fbc61006565400f5b9304000000f20f7053003643de4200") fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:28 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000140)=0xfffffffffffffff7) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000a35000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x20, 0x4, 0x4, 0x40, 0x6}) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000200)=""/181) 18:35:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0xc, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:28 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1cc, 0x0) 18:35:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500), 0x0, 0x0, 0x0) r2 = dup3(r0, r1, 0x80000) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x3, &(0x7f0000000040)=0x4) 18:35:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vfio/vfio\x00', 0x400000, 0x0) getdents(r2, &(0x7f0000000540)=""/239, 0xef) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="71f57d070458204c859670ee0f866535"}], 0x2e0, &(0x7f0000000100), 0x18, 0x80}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000480)=[0x1, 0x10d]) sendmsg$alg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="f63a2d147af41380c666b9f7e9834b0e9b228d4c5302c17d99d326ab054932af88f1b913d3950cc5632468d9985d68f6fef255eb68c4111c11df8f31d007e3fb5a74058731cac515245be3fdbadd14baeb3d5063e62e7177e2f5feffa6d050d2cf613c65c51b14d5e136e0fd897df635d77bca9c856ace9e16c215a6d59e491a42a0986f76cab48dfc34ea726f3b", 0x8e}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x160, 0x4}, 0x4) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000003c0)={@multicast1, @remote}, &(0x7f0000000400)=0xc) 18:35:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1fffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0xa0800, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)={0x8}) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000240)={0x0, 0x4, 0x1f, &(0x7f0000000200)=0xc00000000}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f00000001c0)={0x60000002}) connect$caif(r1, &(0x7f0000000140)=@dgm={0x25, 0x80000000}, 0x18) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:28 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r2, 0x301, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x400c8d0) 18:35:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x11, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x6, 0x10000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x0, 0x4) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e23, 0x7, @local, 0x1}}, 0x9, 0x4, 0xffffffff, 0x1, 0x3c}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f00000001c0)={r3, 0x1}, 0x8) 18:35:28 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x2, 0x0) 18:35:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0xfffffffffffffe61) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) io_setup(0xfffffffffffffff7, &(0x7f0000000000)=0x0) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x7f, 0x0) io_cancel(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x8001, r1, &(0x7f0000000040)="9999ecaa05895cfed0a082111d0430b6c9f5a96d227a64815f746926183ddb81a3a65ac16a29cf963adfbdee232bfaaf73ba24fc2d945dd63f5110015806ff7b251b6ac66911fa0a82e65954bb9b0d7a89297ac9a6d05eb1cd4d33033d1eadfc055805b2fc04ffbaf28156e7194f792334f2b9940ca0b4bd52377227ae39f78abcc91c5d824dba9be786b19df3aa593e3d70e498d4a45dee7c4f4cbb164096429a2a35f4", 0xa4, 0x4, 0x0, 0x2, r3}, &(0x7f0000000200)) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:28 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000200)=""/181) 18:35:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x16, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) ustat(0x8001, &(0x7f0000000000)) 18:35:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="ca0204ed4d8a6c2948a916273abd3086adfaa9625ca0f2ddbf21c6e068f9f8eead62adf4e113b79932b681f9005d5b11f210e544667aae2e115d16157c47334dec114621253f0a030dc9b80bce82d022bfd471f3f8a79b8aa67d73c94a97979b025fb4ddd26722798a6e83920908ec3d80872e89b5a8ef638a44a9fcbb2ae14a4e7f8e424a8676a98ebe878dcf590c19b078678b80", 0x95}, {&(0x7f0000000180)="d19ff5617a61a1d910420e1bd92ea6f325f784129e45fb53adfbbc6a8f6e9842a9d7c7886cbbaff480b67434277791a92fab5a55125d561dbd728aa8ab165acd40242c4ff947e43e2035a132d4c0081e508d08b43fc47b0b8a8f20ae757454e0c190a5e1e36561cdf37adfee28b0e40b4950db653968470485598f02e522a59b9c9780af12c1ac93db2da2d8b7ae3cf3b3598b7288b251a24144caca48a687f0c596c9e31f9a54ce", 0xa8}, {&(0x7f00000000c0)="e08fd7dd1c93b2c422cb58", 0xb}, {&(0x7f0000000240)="cd996d6ae6ae1cbccb0d7749ff446207101401064636ec4aa3e9124c33bdc87d312ba239889c1e1e6fb5f5b0ca9816f45477c542e6bba7a94eee20cdccb12c745bceec176d95b7e4a35732e3277c5b20d5d2f864f558f97e50cf4a587df48ac339877a0a6846a63b90febd7252460eef3d0ab7ff9cbc1f632f849f967a8c0850691ab9fc6590266817f7d5301cd0edf9fd684d152f0c6f29ec746dcefadd28ed7403f1cd416a8a9c5ebebc481c17b96a83ecd8a84c296a3972aedc", 0xbb}, {&(0x7f0000000540)="9f9abc61e6236db578f46fc1c9e32137dd7b87f731996d2fe5611d79dfc7b20008617b9a107fa5762fb8c2cb84156a29bdc688efb4af0424f3137444eae068c0979562028375ad6eeb8f4184dab573eec864bfbae6f8d70ff7c5d2f348357a86f25db17271a2f823f50e1083520b45216b2a2b250db5f022cfd5a069b6520cdb8b27d999de3ff115cc05c0646b6800199e3dbb7df42c2270a2809dae26b4b34a3c2f92c8cba0ff80ff76f11919e1f018f7e977165ae12ce1d115bf2208c55f8fc7961dc7bf5fef0046630c2b40ca77c5db88deac653f730e1fe5efa5c72e3d3581656088e8a667d8de0f1f4defce70d4ee6bfc90dd207435908220715d024470c4b426ed7b46418ed24101fb1b977ec0a3560ff0885db416e5244fc4d4273a3ef4500530a348f43a6f0a8d6c7227acf1203d03ae6ed087c4c7bcc0760b499176b34ce736642904e4e684b855284f4235b41274512b3459b9b73b6ba7bd42fd777322f3c2a0099e73ac8e46810509e20d611f00892a1fdeebd64f9a820b045ce762aff5f66eb33de1e8659e838950a7da94a532ba29b61c0da97ec9e22fc46662d56bd628e8dadb3e2c6e8e15f726f816514d4493ce11d6eccaa26004664c9eb8962814194fe37d4bff40cab4d2d25d75841c0ee20aa61b97a995522df90c7ba43a3756cbc4d3d52af3c23c2288efab9856563859ecdefe60562fde69a66cc3fa9727f3769a45671a712081dde3b049525f02bfdded180260f202c6a191962487100c71c9ededeedb7ffc1b24f4f0f82738f2b85346d25464645c7ffa3b6d04d4de9541f57cb03b1260257b7dbf28604ae03639bfdeb0526e1e59329525f372e2d070745a7499e9d2ad26fd358adf7adbf3fb1a255c0d3883d4c9072649b809ea6eddba1009cf960da3981a1e98762d1aaeeb9eaaa572d830f45ca98964f1113e70f7a8b62fd724079dea03a397a3b22fc79426bd21bfead204ff61d64a71acea7403c0b635c735ccfada25b210ac6e0ae3c14e22cf3f054d209fa98007deaee89d5db5ec22fbbbe79c69f9be95fa2519e2f5b44af8e74378ab907163d63b39e7c8e91e03f9ec5efdd74848f74a9684bae40f3d4e58c626382f304389a3433f10e97dca7f3cdd1849c4fe2d066b095b000fefb9d70960fc0ec06fa1e3533226798d987ba1f9adab337383aa6ec9ab41f340db251e16f0e5cb948196d87f039825ff0624b505203f25b01f544e2da3b41538df61fcb828afcef6fdebd25cc51e6f2bf92bbd6d5047a88e62367a4df5a92a28728c29e190935ec9640f256829ece167952103d3a957beb4adb2d2d9a627c551e448d3eb8990dc430991c1e6951a2652ba57c6c6bf3397614b8167e02c7e0e0a748dead614b20c1b945d31b66c93d1b9d9b7bdd60c20eeb2bf2332d1aeb9438dd018dea23f096466664c2982fb5dfa85b81e9d25d32670e739a56989ce518b350c7ced15d0d828a0384daf44e94f1ae3f8298d31d6122679fae4155c00b9c42df760d4255774c2df172c2612e6ad953766bb7daade8aefd1fc9129d2ffca7dcfc5f1677ff80e026251ec51da8da6d91b3352bf637d0b56ec155f7a89c855f827bee312cd0880312776c0e6e4522ac522aaa84eeaa7042ecb1121e0c354ed5661e44c7290c2b4ab040d5d71e752ca88bf6a6708d91ca3f48445e2ce4dc874cc18a05500b426177517e743d7c64c88f736c53fbc6dd45b3e02413e1ca060700e216cdfb3d4ff4308606972ca1fea17edecc48596ba6c2156a435b3f5a8e48741bc58835c30ae3d154a5c498724e2ed293a358747b5c747a74f6a09e3cc352b248fab763f5d10a62b6f4810f0db36b9c68ef5c3b2b44a9cd302c6eb5d5cb2f333dc321af8cc372333c5237becf40be95622e2e482cfe13f112cd9d5c22038008f8aecb1b364ee573580425f67650be69266eec9eb54def6e64aab4837e85f488ae85981aa868ab63b862f9f02bdc9d93e75f23d20efe6524430547d2bef40523ab5db81b1aee7b5c49e6df47512e9cd7aeedc86451f3bf5272faf7b271d29460a63e4887df9bfe837751a1e61d1e6ed73d23c555b20f34bc8956c35707a7a61c1d797c1f8e51da3513bee139ae2bfcf9b084d294c031ba7d16a97e3c0bfc915405f78ed66274ecaebbbb45b1b1f94c6eed7dd5c5605876df1c3fd2e222d4ca83e0e820972d046a38bb0e12bf079e75b7ddee7723dfe90a70776f0b0f01d5a45c33a1bdf99c66656b86760f7a1caef83ad0c93f0f105ed25d5f2e8564c9aad4e77263ac187c2d945a677780358bd7e328548a989d6878a5e3e6e26abe936b7961b9fe3dbdebb2d06961e975b8c2137792b8211e6b38198b030366b45fc03778d0735d5c6627864a8325b5c7b90129dd589a070592c9039d786c12f96c774dd679d3fe044063e2e3d57781c0056b4c302613db6a4ecfb0515d54dd495a72a27de1532b64f2264a125733f55521ac2a540846b7fe6ac9fe94c6f635dced7efcf15318054bfba0fb7c7acdfc708cb138a51d5aac781c783ca424f309d83a9e39461de8e2dde107c1dfd85d906d4f46fb644de034d3f76462b84a6cdeffecc50e9f67ce9be9a463c42980870e9bbcfdb34473188bfb29a05e7bdfbed1a569f86513040068fef209f420370323c707b2e88d788adad81774e0a809510815cd08de9a2c231bfe8e6e72db5ce867f16871fef7d251162958f285800095c0af4b73f156a565e9d09b3eaa4cb7653b1573908eccdafe91a589643b775d50c311e9cc8122c60755123be1ae76e57c92196fcd25b6fcd8b08cc99e434158802c153e8b5fc4deababf612a77b1419c05edd65370046654076fd63e08b6e555c8bc81425a14e0f55fed31959354aeeadc57d3e1c1bc49040e069adff504dff65b5bee25f45a94b5ba33447b866c02b7694eff548fd107341be388ff04c8e592f20f764f6fd1781b76c5452593ea7dc094e18ae08b2085feca130a9e62e414039f54aa7b99f075a7aa7626d9e8d0d379af493575344c3f081e62e5f5a80d34c66d605f9ec7d7c6e50bb61f52bdf29631763b71d5b8e96680a9a4fce7778e342cbe366f33e164b3b740f0fc5cf67f10686954abbfa6c2c377e94e8e0fa0107abe5fa9fdf2e75663f3eaaba11b6f895ded4e0f89dc1afb987509ff28ab497925dd7d740accb369770fb066e687c6ebcb341f5d4e75202f28d0fba072e2c227e177084ae9dacafd0b9c29ced24ea2b1e841b2434d94df309e8165b919c1ce6adb6f19731e47be285a89e5530cd90e335c57135cb1a3e8f6bbd26c5e203f809b414f8cfff62a7c6ee739ea6a06eca0293b24e8442939f5af55e49b5c72e50fdf59e01e63b879b0a052055389cd1a562a90f3caa71fbe05eac6206f2b3daaa32b1f031632f2190a962ace35fc726213a5920ecd4155ce540bb5ca334b2d667e429863207508c2bfae65503e44ea39290f97a5167a064b6829963c77f38b0244b47afe82bff43210d703c906d96f2e51a480acfacf252c7abfdf10a16b22ef25ef1e6e6eaadf16c5bcbec934f2e510d8ff47ac5c94fc29bc308f887246f60fdfc7f5273e14148d8b8b85876d05545d878e9e35285f84f1c697adf5b6826416061887f472d0e016a60c9114d3897733a93dc2a490af6ff1a22ef5e592b1ecf00d23bb5e19674567a035e07691cd8897f1c138463c6352662ee2c2efa9c0a80fa3857f03e16a87844ed5a4b5d1ccf20639bdca3638f1457936faa5600bee69c31f3521ec4eb9cd131899a08053b3a7c416a6e28952168782ea11cb46b2befb772af938851d4491c49fcd272c907970c151fb032c44aa5693e344ad306449e24d1d3e1236f9c1f5a03cded040b29ecc73d3172d2a47b835297f50df212beccf173b866aee0d596dec0341a5ebc7c1bedfe2bb2195a9e08097ff2c3d686e31d95c9f0d2c06e3ccc8dd8e6fe8cf796ea3ec8ef02f5f7cead4bb504e026ed5fc14f56d014dfddf26526c482a8b97a0579dd39f6405d504fbadfa123f819a13fb34c1acce1b40199a7c235b1a3ea64c7838b2dcd857dbbc67dc6696c805db1704b04bbfd3384091263d1d643a7eecbd7b0f4bc18cc731472efe67b4ed560a6eeb8ec170152ce3a9563903a190838ab318c777f67b8d3449005db60ad36c0cde74f3276058f56f89494003f0d24bb5b0b8aa9ba1661e20ca477d8674f4b1c288035e80a1aadc2190fd230634364a00b932643878ad31ddde187ffa8a02fe406cf048709ff31b445c3ad13fbfaa1e151d9e4ee2bcce9437306328c2f8b90bd836f5273d227a1f410ab1a34046657c7cac586a036c36b24280ea17310624ab60c30470e7a008eeb21e701ce49253170848442b6699eeae47cc0453cc2b273b2d03c347c2c3bed27480e41272b7d009b68df80c0dc0f47b78d515c43854eaa2b0ed42881879d10095f0d1f567f11c4f73e16b6237da5d0861a0161804b5112f346e22921564488139022745a57345012993e61f37fe33b9bd931948dc329776153ba009d49ab1daa69b8e67fdeceb4afed9670ce5e8989f32d2dbaf6ee5b3c1f57659c84d212069ff8b51cccc5c18a9838f7b09983d6be11413d5765900d99656ef23f5836e999a8097ab2c97942a8252f313b45e16827c6e5ae4bcbc518af0d1d3191579dbf553b27bc128c78f1fe59c52a7b7783825a664eb60458684f395e0c68ea687417f6cac03758a530fd7655efe8f7843ffcd33356a54999c34727542f5175b67ec04dcbba13af0570dd01203eec1a3297ee4547c55007b119ff43877e76655ab1aecfa5f459df253a83dba1b1f902e1608a9307c7fc48c46b5f48a2570f560d038275ae787f282602e40a8d08b0bf532796a1e8534af2157e4f5e01425c8a7cc061a74d2580f3ca3f6703ec28e7452e5adf18c960e78f5fec6f2c7610289b3cbb821d830590ff914a9639f7f7186a489dae852b02e89b881b9b322186e1d3c7aad6a4f8a6a4cd918ea83644a6eb69aebfefbcee381f461376b003661c6e73a14b60cf106b79ae7ad8f9d40a08a7eb5b6e0f9151efaf9489cbc41e26e9fb1275823144736610f667abccff44f122ac71e35735c4ac4837015560e17d14e470017371a128f703c945846538892e144f91835813c0c1fcafce91019a949f816fec5a39d265e2ef840c2771b71e4d05269c2e1cd2e7a495ccef977549d7d209078cf1ff75b4fec9ca81f9acdfcd36a9b5bfabee66f27ebdbbead886a6eac93d3cdb9f14cde9e694622d927edac6d0d32d567c0829249e81c48908e98212c05168dccb6ae867c6704e0e61a1565a8cc65c08d29c08378477113ae25d9970da1039b09d25b2254d8732e2cc7baddb6fe8e553bad6727e2a4b3280bb060989feb778b349dd8a26972e8f24d22b5fe10c8d2cc23ac563ec3e16709cd605192b7f952ccd7d74af9a16fc6c5a4b465c571e9a84964c404285a0cd86967535325e37308ad35b8cff3f4f6f11a0440d8600be403a61699b3886c742df9e6e336245bacf6bdd50d8934b8ce47918c08f6b5fbf0af8e37eb4a0211bf737ec5b50dfc377376d9ab414e7932f0d4b0ded1ddb39c0d99d4779d522dc6a38638dd910f10f1eac60248fe9ba21161dc32cc7e9b6d5c6e37fd4c9e45c8339fe558c1ce606494d462ddf053bae1d7e6da70f0cd48b441bc342d9676e62a0640f44a96daa53bd69d2d35f9b584a80b6bc9d242efceaa231897361573f1e05604faca1321a7ce037ea65a5b55213980f1e0571e7cee2327143e5c39262a6fb0e267e7b83fe91601", 0x1000}], 0x5, &(0x7f0000000100)=[@op={0x18}], 0xfffffffffffffe2b}], 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x7ff, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) recvmmsg(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x4000000000000d6, 0x0, 0x0) 18:35:28 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x56, 0x0) 18:35:28 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) r2 = socket(0x10, 0x3, 0x7fffffff) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r3, 0x2, 0x70bd2d, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x8, 0x13, @l2={'ib', 0x3a, '\x00'}}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xc804}, 0x4800) 18:35:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfff, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x3, @remote, 0x8}], 0x1c) 18:35:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x40000) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x18, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000540)="0a07008000000000020000005c54dbb75c71d33db503f6ad8e3ae1b8ed0d3e8f9c5e8cec4580a1c0a7e670c9d1ff650b0ee807c5e3ccca5e26616004a84b387db0051ab09ee436c8e51705fc0bee9b27d2516f33e590708099034dc682d439472f577f45ed9c4154c584cef9ed364eee5a0beedfb73036a2758506531845e0c75b49ed6005b7b535e76aa853d712276eeb200e9cb55ab483a144e8f7e2e0b6618057e6f537598a1cd24cb8c49c08baecf8c3003ac1d69891900708c2b208853332ccfd3be15af01a2dba7ac4b53983", 0x48b) r1 = accept$alg(r0, 0x0, 0x0) syz_read_part_table(0x291b, 0x5, &(0x7f0000000380)=[{&(0x7f0000000000)="c56c1bbb9d0de2ad30c4b1dd7dd77214afabdf94638bfa80d4191a782dc647b77bd7d5ca8d7cd2c8c1d12a2210fd48d0444234e707b0c9b16d4cdba9bf33eaced01b9a7f137bcc88a9306c68b57933e4370192043ee3cbbdd1f7d63c0243c51a41bf8d2480c10460ab95e3c013316e0f6cfa9d916bbd1aacd64c9fceea57627f2895e7756692d20229895b1320a993dd8a834e1b67ee67e7efdb1146b28fb894088e67680fff7c30887ed9332ba9e0472ad3e38d01057af86554d7a6c141f9e06b3f70ba3c94d5c1d25f92523de2bbee65", 0xd1, 0x4}, {&(0x7f0000000180)="db0d5e664ddd0c4d1591ca826b9a650a8abd854b4a2c53cbe1a71823ff48fe2c2ca229dd68eeb71535d0f00d62b473c60ab50c7f", 0x34, 0x7}, {&(0x7f00000001c0)="3118f56a4953203c15f922710b0159b068f1615b9a02e6371ea9e3903d60e8fa4f2f0fdb4631e8ea67fd92a0ee2b06ad5db69eeaa96f5c6f07a36fa7a5f2cd482fdde9ba1d99ab897367309e4f4ffd6ba3fe4966b21625b371497ccdef950a665e82328e5293aed2016e1037c6141ff7a29025b09c03bd65ee480d8b5539bda1", 0x80, 0x1}, {&(0x7f0000000240)="38940aab655df9e7069cd503d6ee998ccebb9ff0cc2879a1630bc5fe7bcb7d43941aca6e430b7d1f32271b1b0fcb662d219638a7aabc87be7efe9d7e6f7af2b2612aa56aa5d4302a85add96cd6a8bcb3", 0x50, 0x7}, {&(0x7f00000002c0)="77a830b971ed072c20ec9c007f30750ad203b13a3d8116d0ac15d02d8e7fe09de278c6dec1cfe556a5a5fdfb731af07d861bf965e8f63f595d4f2bad9fe23136b8563c33870649827667dc31685124e518e112f1ed001850e64c4bcb0b50e738307c7627d40d208cf94d00e457416d110e88e63cbf96ebe24b88064ad9454dfa2e92ce2ff8c93a", 0x87, 0x8}]) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000700)='/dev/ptmx\x00', 0xfffd, 0x0) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000440)={0x7, 0x4}) sync_file_range(r1, 0x6, 0x7, 0x2) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:29 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1be, 0x0) 18:35:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="0211000f1f0000002abd7000fcdbdf250900180003053e00b661e906ececae02e30db00b91afe29d0338df7e3119a2f135e4de38ca3aa7c2db5ec643e527e565726dfca0e9c4a4f62be0a7d0dd3f4534e63e25bfbe82000005001a0000000000000000000000000000000001ff0200000000000000000000000000011b00141007001900000000000a004e2480000000fe8800000000000000000000000001010700000002004e21e0000001000000000000000000000000040003000000000000040000000000000200000000000000060000000000000002001000000004d5000004d300000000010014006d000000010016004e210000"], 0xf8}}, 0x4000) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80040, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000140)=""/116, &(0x7f0000000240)=0xab0f73605acb649c) 18:35:29 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0xa, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f0000000140)) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) [ 738.129377] loop3: unable to read partition table 18:35:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x1700, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 738.151784] loop3: partition table beyond EOD, truncated [ 738.169607] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 18:35:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) pipe2(&(0x7f0000000000), 0x84000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:29 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x3a, 0x0) [ 738.260943] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 18:35:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1a72, 0x101000) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000140)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x306, @remote}, 0x8, {0x2, 0x4e20, @empty}, 'veth1_to_team\x00'}) [ 738.377048] loop3: unable to read partition table [ 738.390911] loop3: partition table beyond EOD, truncated [ 738.396520] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 18:35:29 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x10000, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400201) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) r3 = fcntl$dupfd(r1, 0x406, r0) ioctl$VIDIOC_G_DV_TIMINGS(r3, 0xc0845658, &(0x7f0000000200)={0x0, @bt={0x80000000, 0x7, 0x1, 0x1, 0x40, 0x6, 0x200, 0x24, 0xff, 0x40, 0x1, 0x0, 0xfffffffffffffff9, 0x63d, 0x4, 0x4}}) bind$isdn(r3, &(0x7f0000000000)={0x22, 0x6, 0x0, 0x5, 0x100}, 0x6) 18:35:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x8000000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:29 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x197, 0x0) 18:35:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000180)=0x8) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(serpent)\x00'}, 0x22d) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) 18:35:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000001c0)=0x6a3f2b22c5bb0dd5) [ 738.656019] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 18:35:29 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x19f, 0x0) 18:35:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xd800000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x40003, 0x30, 0x3}, &(0x7f00000001c0)=0x11) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e24, 0x1, @mcast1, 0x2}}}, 0x84) getpeername(r0, &(0x7f0000000000)=@isdn, &(0x7f0000000080)=0x80) 18:35:30 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x10001, 0x400000000001) r1 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) r2 = getpid() openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) syz_open_procfs(r2, &(0x7f0000000280)='\x03\x00t/sctp\x00') prctl$PR_SET_KEEPCAPS(0x8, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000440)='/proc/capi/capi20ncci\x00', 0x200001, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000240)=0x400) ioctl$VIDIOC_STREAMOFF(r4, 0x40045613, &(0x7f0000000140)=0x7) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000380)=""/181) 18:35:30 executing program 0: r0 = getpgid(0xffffffffffffffff) ptrace$peekuser(0x3, r0, 0xb2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x80, 0x400000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200a}, 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)={0x1fc, r3, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xdef3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}]}]}, @TIPC_NLA_LINK={0x154, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x62}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8d71}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x71f1}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x88b}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffff800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb914}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}]}]}, @TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8140}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x1fc}, 0x1, 0x0, 0x0, 0x40800}, 0x8001) r4 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r4, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:30 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xdd, 0x0) 18:35:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(aegis256-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000040)={0x0, 0xa, 0x1000, &(0x7f0000000540)="20c6809c148b3f8b7fbce3f6a99e0c3a33ca2e7554a6139d4c868a92aadd94cea32f33d985875e5bf55a37746f6b31f432c3a0beb0f3a4c23139fb3d05d0af761edc06eadad04bf243b863bd682fee1ca0f980f1be7b96743b3a75a4e6a68ba489d2e662475b4a0f210bed1cfefde8ca0a36d4154288df81af14ecb4ad11d3abf103cfec138459f0dac587dd3cfe2dce92ab5e9041c858ca61d537e9ddb29f3fda35a9f692c2cb9ff963f8890c2c985fe357211f086a791aa481141c0aed42419c10ab41afa617622998ff08dbd6fb119c9bb3bbaa08a21777f5d56134cda7fb54b603b5d6a329ee0fbcd6f5cd03a29dbcb11a155d1b2488feea115f6ec152c57015d26380bdc26d56033af15f2b1af9b2e8ab98a211972d26a78f3466dd849daab46331c21a28e7d794b5e211f0ca310ff7f5b7a77f7594aae4b543624f23612ad43926c4040ce9a3f895442b65d5662b54c370932da85d19b1a383cc04e549d1239bc4d9b55e762b9cbacd8bdbdde52fa6a4331b0bf752c90e03b01d39bebe639bc7dc1e053ae806e247b8b2e8f22e9b0b318a67d73a9274fa4b3f067bdd576a2dc33429ba90784f8835c27c1c547be6e31fb516f343f45bdfa99f35a4b0c8ea7723422357b13ce2741644dec4f145f8383ce34fd4758c02cea481c08393994fa0e32e14901337e14fc5ff1b37e746b968fd3d792ac3479a9d9b70bffdee30831088e6ae3f2e7254548a2aadd40a67208d07a898e3307af056960aee1c6cde8e85b44d159755b0a717081f275e3b8d1324a94e6da3ea56206ed5cd402e0bbaa33ee5470b30185498214bb1b25cf5da0d2df4f241e62292738e3d0fc03fe1f62dacf0d8fcd3b8271afca74d22d93e1813ff98ef6bed53abfcb62e65ab20aa8114627f2aba7a67edad0182721c4e2df182045a78d0c2c76c2201204c89615f100aa1f60b5ab2ca7d4bd8b8b36ff4987e51ea1f81afbf2eccb3c52c1c6807c1dd4ecc466610600264ff48fba89c1d6ebaffbf8c66ca02d86051ce28c356b16fe249c7244f68a8c54f518aabe180ed512544ae3024f66c5a740d1939a2b1ba76c27c625f8fff45c9bdaa9326a89d585dd288a43090512759d3f469709517f015a777cbceb74eaf455913ef5f72e0ea2e087a42405e56b8aecda57d793deccf598f4417da7ff19692fa13f764a2d1e2cbc76bbd5442622fb9173ea980ba73042266efe09174b003537996ad809c3bda3993ded84592e99301dfcea9310d2ba676e9cd76315a0994d42a3fb29840557551b978091a26a9300f11d16244e5c23fb058c5bb2b1e7cdcac6a65b7464bb15ec78b65cd118a390210e32eef5c84b8543d69a1ecaff9370e3659686e93b8f745ecf083f3ff617207b3cb7202f918e15bdbd156c69baa6b05ebdf439887daac48e00aed7a518c27a23b3a499dc9b15c5e45bb5307e35ade87e5aafd43dcb5bf06365da59b1775834339249c54325c4c4d204749abe753e802643b470aad4e5908350edfb3af1d8cc33b4827b8711ff574837ea85d7154ee69f0901d6a7c9474d41513f7425453aab5de2d98ae6723a0c0134fd8f4a4028291a20e6bc9d32e8f7d6b42f3f7882958e07e44d02cb76eb9a7b9c81992265b293f43a9f6d7c9586b66348a0e76c59ffef4eaf5981480d86f6030f5f85e502557c185a7321d13f641b71abe86baae6c059f6e1ff9a2c7068b9254f53855a50e5df22a2ae0d53c7e5df76d50683adb1ae68ab9321097d33ed8a2c60153031dbadbd9f561cdf57515670f4c5ed6b03e6b6d33720de063e4103c0b59eaabe386ac3ef21f8612025138a6f4dc96a6728992190d53986f2a5f44bd80e38529ec0227d685a7396d98fccf79bb081f06d612b156c063b50a70ce0400c8eb7ed5040317c652128dd2d399f10c469ac72cd98168c149defdaa560d2e4feb96917557d25499737289c0bf57057bfd929bf30885f62adc649677dc5fea1ea524e20ec2aed7d89d3a91332f9e9859e7b0340a5af17d13d80ce9266f14b527c5f679a1e8f6b63591eefdecfcb751bb3a289cb34ca1b35511d9c350b2d786fa631d099f172f5e70591905cd793f02e1c52633cd7de88fa25fd1f9d411e36725d4e13ac79995e4aebab4f8e5a8d829b3295b3f0b6d2ac7ebebeac7c311da38551768121a01cfbb47199dd7c427af966f0497beb8bd6dbfaf4ed54e766e870a8de45e7e82566bc1a14f67bc0702e2578aaa716778294d742f8a511a3c66b0de2b558d5fe6a1817db7419fa64e924b7a4de0d2d8f927902bba018c5c2a9b84f64f5102edcf0f3360efa6f3dc41860bcd3486483c2d8dcc5597d3980fddf31ba3529c44db47da5c6df98e17aca1252bb8f354b30496bde03b9a13e56249a54e930ddc6559927cafdfe704682954a20388893dd8eebbf53ca06b14be86ac54205711ce8a0190574e2344f81f448d24e1660466a611002740873fee9de93185e8f8aa9b8d3fc6f4d812cee608c8d09d6a4ece5a5eefb18c3894d999b04d0d66804889e31e549e5c93828970921de5d7081cf06fd6eeccc86dd45bb639967a8c2d3b28c4f9cf145ecbcbb1d979b624b2ede401fa35c6b85d70514b5a827754da40baf951abc46b96e4294e25eb1e10b27c18ee77b3630f250ceeb0294e800a32a38786a7cb7ebc7fd3cf1dda889f5e7cd42beb2ce7a96058a24d6d423f6206a0cac94e180b72282fb5a3da3e0c05a7dac2945e5bbb4bb15a8cb22d5c44221c6f292b81ded288099ad5a78dada1b735e3965adaa7a3923314e47029c601128062d0537420cf4d458d49d514de9d7e4503599c55a46a7d09154e79ffa98e9721ec0f000b2849b4d4afff1824797fd118d01d41e05acf9799b772eceadbcf2e37e4539114c5d3ffd7a7436e25c7969c49c4b73c83b280d1a03f0fe9936234e3cfbd5d027f0e797505fb27dd2d75bb0610ba8e0e004ff8c74cfded6d2b82d34ec8071a12b9e235fc604e421f0c0053681f2c04f4e35591b732955ed01539edaf30eaead12f568acd64dfe054084e0113a7b9c8138b1e65833b2a3e831df328fe0ee686610f49aa69ffcc1a439cd4ff4665e8f85573bf7f849c76a4e42e2c59496c58b9eee9ebbaa1ec32d743f3cd0392b568ea760c53b7cbaf9ac68fa81a09cc53bad9e6acdd9573a16774d3171ca243988b2f04d9bc5cfcdb12e3e0a9aded7b7160a7ac389a7fb2586682470717552fbc4ca50254bf2de072b5eb992c0adbc97667642b1d45b36113499759f0530424d13b6ddccfecb38ff51448ae82e44e43f0691cc90a0db31029ef6254e1b3a7c207b124616926207a9d468266cccb5fec8bf8b239aa8d8ebebb240fbb54334ba3eb3256e96c17d2e68999e21bb9bc4d60cea0748dd702a92f13c617e740a756d2863806db4106455696d2b43c0a41e57ca0d5f4f1d784ed7ae106f6f05d97a94cb1fbca885c441063c7701e659e1f4c5321a5a3f1a61f84ea1a81a0f20a194b69fbe870a7669d4fcac7f921886d424d0dc558ef711ed7d1744b8369e46931b9684828e5c4139386f6cc44b4e216567fa9e363547d1ce42f852b90b5bd1fb5b3945634f50507f4e5310ce518b0a44c3a729fe67726e12747367a475c7947cdc210ac0dc13fd3c1d8e675f7b9c120f2668586a18ee2fd9e3af91d3fea5c8d206394464905716d758bbd26786862fd704ac8ae16b1308ab2dbf4299c5ea7e04b9c77bda93a9393792428762e10fa96246282883ec46aae4017aa8ecc0808e34f59962586dcf74058d44a6e22afaa4a758a268fe33b86e9ba7b4a52bdb0e2b1c548f5362fe4f440d04b3977ce74217330e57154cb0e846a914170b2098f2a66f1876b7f2599874737d6b7807851b52bf7c87b54e6b9a0fef06bb3a9a74d29d66e55f5c78e6b7b8f845b0d9e8a0687d79230c74ece89f50ebefd86c2e68751b7159de592dbb8c83d9c68cbfbcf74e3ea79fe1fed0f23dff1c296d264e4290b7da7deefdb8a5d847a99f2f7d041d70593519915cb85f46e1d6834794deacbd1dec235ff10b6a6679e5a9b150b001f93097a9bd5f5edf63e0bed28e323a8bf707a539f0715531905efb7924da915368bb1bb1412df22d458d947db38720e87014d9b4833bef61b935661d00cbed67b8bed31924900424fe705f468fe3ad177915ef13792d7b345a4ad09341891d5237cad10b2d3eee9688e81cf8e075e878ac855bed3d1a4abb57b9c3c78ca0a952448e7b352550cf4b37189f167e97d9760925c81c94fb35bc1faa6434701855ee4576bbceaf5cabb8043ff7cfe3c13947a631e81dfe1c31956e6391e21c4f6e04c26700368be8a35cd5fe7c187834d9bc27ffd35e3fa075db7897c418c5dcb856d964dcbb5a448cafb7b5b4c0d3e7a3a2541364db9e23db04a0701a45f00bd02cce1285e6c18626533c34ccedfc7a5c1be3f48bc0ff10aebf3fd32f11e35c93c5863bcb4c63fee8c7afa2c36ee0d95068e7d5873ccc020a061a719b12e50302bcfa8f3b420cfd54dd81832915aed4ba83308ab50c6d99306b3bd5d90b18e76a3347401a8bae5a888e3cf5788fd5eb4f07d04c749886f7d297cfc07a6f805356f8121edb7415c10681563bbb3e60697129d0798404a78dce9ecf3c95e3bd50c2d42aa07e7a75932eee2aab5218e9abf3540961cb3b12124afb0c1134bb6760b88b6ee9304f333add19dc1777b8fd4ce860bb218f86fe8e424bc1497be7807fc9e50ed76c6b037e0c1feb579e8f4360519ae4405a3c07c33b3458affb659abc881c1fcd3661508b0c7a558c5ff2a21e7455384f7c543fef41b2d7060b599da971aa5a8b947dcfc002dcae5bfc8c3831af247d60b9ba3a1c94b10f4931f2ebf4e6c0b21cef2899746140f7e104e2b7c3bfcfdae6b28b331857bb57773cda666ee6b3b3d834625bcc68944bfab8574d5373513aec8a1b0cf39c18ed287e9d5a773eb7b2ebfdc5c679152815543e2df6a14bd70cfbd35ebff522bfb6cc58cc0a5dd139d8b392b8a4bba2cd1f1e8325c76a783bea09c3e797f0c78938fb3e93a1f6fe3b2eda7ce86a00a8d3d3291a25315fd96510bac67d597df624c39fef0459969f2cff2666a4e7cdc97954606fea7f69e5c31ad6f3f156492a2bca4f8c1ea7a94e9701a00f0998b37b3f74507fef36d4043e4e07eb248d82207addf77e7c42002336cc4875f84cd33c27a1532e738e6765999a3dd9c42e359b7b647264b268f08878995a1c03feb6cc4c76c40a15da8f974ae426f88d4c748901c1023704fe87f07dd250cd7411697b93f014552954b28acab84f992382fa7ba8777b1cabb3d118f99d0628ee09e5cb3bcba0975f76bad0268d4a28c9d7d08f3f99b0672330f96e4656483de04c04d2b442efe20790c4d101c49dbff051d516eea2e8199c0d219dbf8bf4956242208f048ea17b147ef0fece77937303e04c9868945d989a888847fb73ec3eec4e5fff5c608ede5f7ddac07f96733b1e32a65c98b5fa541d4b423e106389417994853744d71c6865ba9b0d4808dcdb211be3ae8740b90be74fff6f73178e471e6f5a9bfc9255a07bc92a60de684bcf74868f2f0d712d3abef3485c7470f698ed323a4586d302f1a822ba8b7cb8e39623c739fb14fc7239a4c262abb7081a88490858fede9e2104d91362ed28bd5ea4fd53631c5299fb6df2d2c66cd5564ccd58e395c719f4640754dd52f5966a56b0530a9e96da850da373546d7b92336c62c23e39117720ae931ef6e0c9392d08c360f8a3c02a3b7fba4866878894d9f8f01bbcca7962e95b4f56ff7"}) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x38, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:30 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x10000, 0x2000) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000280)) r1 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x2000000000, 0x2) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x448102, 0x0) r3 = dup3(r2, r1, 0x80000) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r4 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r2, 0x0, 0x11, &(0x7f0000000140)='cpusetproc^proc[\x00'}, 0x30) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r2, r1, 0x80}) ioctl$EVIOCGKEYCODE(r1, 0x40084503, &(0x7f0000000080)=""/181) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x220001, 0x0) 18:35:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000040)) r2 = accept$alg(r0, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f00000002c0)=0x9) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000180)={{0x2000, 0x16000, 0xf, 0x59, 0x7, 0x6, 0x1, 0x4, 0x0, 0x7, 0x7, 0x7}, {0x0, 0x0, 0xf, 0x1, 0x10001, 0x0, 0x8, 0xc5, 0x101, 0xffff, 0x9bf, 0x100000001}, {0x100000, 0x1, 0x1b, 0x6, 0x3, 0x74b, 0x3, 0xff, 0x40, 0x6, 0x2, 0x1}, {0xd000, 0xd000, 0x9, 0x5, 0x8, 0x1000, 0x1, 0xfff, 0x80000000, 0x7fffffff, 0x7, 0x6e8}, {0x0, 0xf000, 0xf, 0x2, 0xfffffffffffff001, 0x86, 0x800, 0x1, 0xeb2, 0x7f, 0x1000, 0xfffffffffffffffb}, {0x1000, 0x7000, 0xf, 0x5, 0x6bb4, 0x67c6, 0x9, 0x6, 0x6a7, 0x9, 0x0, 0xc74}, {0x7000, 0x0, 0xf, 0x2, 0xfffffffffffffffe, 0xffffffff, 0x3, 0x0, 0xfff, 0x0, 0x81, 0x4}, {0x0, 0xf004, 0xc, 0x1, 0x6, 0x5, 0x9, 0x56, 0x1000, 0x6, 0xa493, 0x7fff}, {0x110000, 0x3000}, {0x5000, 0x6}, 0x20000000, 0x0, 0x10000, 0x0, 0x9, 0x1100, 0x100000, [0x100000000, 0x0, 0xffffffffffff8001, 0x8c]}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200, @time={0x0, 0x1c9c380}, 0x1, {0x3, 0x7}, 0x5, 0x2, 0x8001}) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:30 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x10000, 0xffffff7ffffffffe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x10000, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x800, 0x101040) syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x3, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x84003, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:30 executing program 5: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x80000001, 0x1) getpeername$tipc(r1, &(0x7f0000000080)=@id, &(0x7f00000000c0)=0x10) 18:35:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x4ea16e6365720000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x1, 0x8000) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000005c0)=0x14, 0x80800) sendmsg$can_raw(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x1d, r2}, 0x10, &(0x7f00000006c0)={&(0x7f0000000640)=@canfd={{0x0, 0x8b, 0x1, 0x7}, 0x16, 0x2, 0x0, 0x0, "5bc88ba0ac59d253796e3b42552960ab0ebad8e50d926d3298db4e0b40653c0d52d4d15730a1caf99c309f9609d01cb2a2f0b5b774dcf8589b581ca2d4bdf48f"}, 0x48}, 0x1, 0x0, 0x0, 0x48040}, 0x10) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) r3 = accept$alg(r0, 0x0, 0x0) r4 = dup3(r0, r3, 0x80000) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f00000003c0)={0xf000000, 0x8, 0x1, [], &(0x7f0000000380)={0xba093f, 0x100000000, [], @ptr=0x3}}) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xff, 0x40) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) sendmsg$can_raw(r5, &(0x7f0000000340)={&(0x7f0000000280)={0x1d, r6}, 0x10, &(0x7f0000000300)={&(0x7f00000002c0)=@can={{0x1, 0x2, 0xffff, 0x6}, 0x8, 0x2, 0x0, 0x0, "b674b74f7ff266c5"}, 0x10}, 0x1, 0x0, 0x0, 0x40840}, 0x8084) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x200) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000180)='56') ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000200)={[{0xffff, 0x101, 0x3, 0x3, 0x6, 0xf21, 0x5, 0x1, 0x3, 0x3, 0x101, 0x7, 0x5e7}, {0x7, 0x2, 0x4, 0x901, 0xb1f, 0xff0, 0x7f, 0xffffffffffffec87, 0x3ff, 0x4, 0x597, 0x1ff, 0x16}, {0x7ff, 0x5, 0x8, 0xd91, 0x8, 0x8000, 0x7, 0xffffffffffff8d01, 0x8, 0xae, 0x6, 0x5, 0x1ff}], 0x80000001}) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x40000) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000280)={0x2, "43dd8c332ab23687e395db0913c2a0fd2d35280fdfea1f4311e1b465bfa69a82", 0x1, 0x1}) 18:35:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) readahead(r0, 0x3, 0x1) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101000, 0x0) sendmmsg$alg(r1, &(0x7f0000001dc0)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="6708976a15275cb3058f60e5986d17f1f3277a88810621d06fcd4e57b019a1c3ceab97c4c160ae7c26fb2244e2c4e1eab55ebdb0d1a2e85934a1d566b292021b75bc3eaf4e1c7a09", 0x48}], 0x1, 0x0, 0x0, 0x80}, {0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000180)="ab8bddbaa4bf8a61c4c441bf60c75d21e01eb828dbb54a73da83638fc066fec4f6559d5fa61157308cd494c1af79c4d574dd59d6ff98752cf2ee826ff67a63054d44bf3e21ab3236fcedc14355e65cb40b3c89e3dbf4f844765bb2ca1428dcbb03540e461da51582b0d93cce0d20bf98180384ec6c06fe88c20fd5fd4116425e19cc90da483c68699a579b6af69b0abe701e1cdf34d84f629b22", 0x9a}, {&(0x7f0000000240)="c4794e3d35ee464b8b3c64e666c7c9bc0d01d3", 0x13}, {&(0x7f0000000280)="07e54ec7ff651e88f3174b5dcb87260e87bd2d69ccfba9de7b9f99bdedd16d2a9f885543cc6546cf1de4bb0121b608bc11e4b07d981766252210ee218c843cd4226980f2c3c56b26a7a230bf1ba7e6611f971a16231aecc22376fca2a342fb17c9030120b25893aab3511bc071f2ed74646c7fa69b12adbb6293ba072c86d626265033f6afd293de3da72ca0bd5bda88fcfbc77376de059d8264ebde62bd10af65bcae942991786cbe433203b90d20bd498c3acc1a994f654e166843c49f046a8cfc0875000bcd82535242847ff25ba9697c568e33edd6b90f7692d5f956381a14722a", 0xe3}, {&(0x7f0000000380)="58213aeb73ad0d0b1ae94fa4113c0c648449f52c7748cf78415f577b4609d119dd591900a31e4b86fef5e4d80a73310459674b599ede0e16d7dd077e93fef702552cbb305fde69de81", 0x49}, {&(0x7f0000000540)="7e353ab134fe98b49452c3db6afa2309daa704d98b78bb0b1c7410e57565b1451348808bab79cb5eeb98c8b312fc897c4a20a58300852f3a67efca1eca7c1eead371ed00af44c35514ea6b09b7afd512e8a5a2bd578f7f447d7065ea36a7c90ea96897853845703fc2a15dfc0a28a576050299139803cbaf2d868aee9acb5325471059eed337cc85a154e4d8c64998ffd7aea79dfdde26b4152d3a193d63109e543801d59f8e32cc1717f95d4b31a902f18381226f45b089da98223d16763cbfa460b1ac0a9b77204827b94994fec5439d55b267164e5e1d08334c2486877dfc91c9baaa55ac673abf3b374e0aea62ead6933640d956a9629cfdf7dba6b22644e7fd994e9dbf23563a1d4f88fb6170b634e0d05cf272125d2ee290f8c9b046af463e8d6ba15435c80def4ab5c97c4b000c12ae9e149e9017bcb61fefc19ab9b6e5171b4f627b25c8f855c037486a04732e9fd634d0cd287e5635a074c5c893868f81bd09e3799f6d6509f4a1bf581149006d2e02acdfe8a1ffde49435d29c0bf8c291d86d6bc7ac751d1c8850564cf5545f968ec988688e8461246d14d2ab518a572c054585f71e0bb41b3104063b34395030b95b3dc365e6dd472d4e5472d7076676286bff2aa9b683d5533ec7b33eb54cef12918c9dfa9230135d907de8bff0fb7ee02cd6564c660cdd3508e1384857291d4872ca8fea9be3f2e92f87466b9790a800cfae8cd3b3796542ff5bb2450f9a646f170d8ab9704482869714a0581f3404554a6e79e8aa6fd5ad258212c8cb917576ac5bb54d8e7587648aaad5456733d16070660f82ef5cacdf7ccc9194db5dc19707b1dac84a661334273274e82a868510b336881bdd01a100b6fe9d26e2d945a48829f85bbe276ef6907719d249281f8d97b773ed33ac7925b3fe6a50adf31ad1d0b05f6e1b71cf09301234fa2c633fa18305bdc9dd2b11cfd81233c9dbd483017e4d7a3ef50212ce9b80a715dac2c8843db241cf8ffcad07cfd8abe33730f7bfa8a8aa1d822f22bf0fe40a07afbadbdc460e54f80fd07dafb229fdd62adb754ebe1f3197af49be710b49fb2d8be746674165f7516c0b89c7ac3a177573cfb2cf052aa72a8d45ad36aa6317bc9b0aa52518de7f8f3bebd92bd68368ea2d6a6a85ca20405a7bdf222e159d61dbd5573c1ad172cf514141ea780330c982be9aa7ef05eafc2952ceca573aaf20e004a4e2bb7309f74e6a2f6ea2ea3e4de836379c4437e45c6afa06113dabcb59918adbafffc9db76892ab2d2bb8e65271aa3740200d780b8efa8a5ab754f5f99d8b21fb810f9930cdee36785339fd06977d429d68cae559da32d27326e2c514a9cc1e7b511491834509f845c2eb42c95372cada2f3423c4c61bd7490d2da6bd4a4b5d919551b70452f3a9ea783154cd96e6736399564be9cd959344d92725d7b883d56e0bad4b52d4d5bba7ab277367e347dcc9091a514cbde3ea338c82c2f112edbf9e82ece2fd46dae6298dc0e5d91ccf98a2d36a1a6d911cf5f397999bf3369e59c5a875c107cb65759143b0f5de5b904f2afbee5615d5b35442b09ff599c511356ab679d82bebfa2b801c9b2ecf4207a691409c8fdb36782fcb605c79a866d2c4a9cd6b2b1dd06dadfb336cfce94153300525c4b7f1904feb2176d5663aa8e5e84e48276d713a84c55851831e0f4753673b6cfc2d45b574506abac7614c8940e594a99b336717ab4de37f95cb9883d76079c3d4b4163f277fe7afca5ce0eee5f3c3b4aaac629800e369a44d144cc7297c0aaea156ade50a0f997e7a55a4705d196e7ccab22786a047af415a4a627575cb0586ef84ee4225f6e7916432e4c58f74640de53e6e44bdadbab0890c802486fc3a990c7784d569cd11198c008654187c5567344f6aed8f23cfefb9397855e455aeb18969da81bf005ca1f750a7b61a04b59f114ecb2b966bf1bd74416cf0020d625b09244bd3bf54feeac2cdaa98f2b1f8e2ce8387cff536c188c892084a3c786d05707030c58e5fd0dc8d421aa797c7f2b23cf0ac06a46e92a2a9e2fe66928f673fa6d6300666706bcbfc762c0f92a192f29c9ca12c576a3a995eac3fcfedb9aad827e1f917b70c61be3c4b65b030915f75618c1ca8eb54aba0951cce8a262614d02cb63a5d225a9abe9a47b2d7e924fe1a48d1249c1c8263d27b81ed21b3fa823861248c5a59146e91076ff42e94f11d1a1773caf73a6ab9d3d42e85568f69a39930a904891c06bbe8564656cb8117928c5010ca777e5345436e5a976dc87b16acb21e1dff80d3fdf61491f1fb2a52605bfcdc3db03d67ac84155f33ef92e30dcff05d0baf16caf8737f655359b0a18f4f3d066b25b9e8e2bfd09cea7931958563fd3b15a3c4e9cd5a23bbc9a6a40220e2c6783b963a1fa381d26b9eaaf6c2c2e00852c6605ae71f319842a8109cfd46e017d1c22a31e68d06facbb834b523e22e8278d21a5b22cb9612061211949687160345b166c5b240cdbb258cb8e035b7242c531c6c940dca8107d0c5b373756e3c3d9df1bf227bac1edca98e053e2490fa478d8799ed863d2b33c70a2e0647a41d6bc83b38a83d94035d9ff2cb8f0db4f1ce2db3f177221a832fb41d6b4a521e4e459341056d86ab09fda30e80488cc534e3fef6d48718d2c09912caf48736f7e15edaa4be462f155841770767c730d950e0eb1e62a625f911b6f924c263f7f0f30e5ea2c85cd07a8180ff8ada56ea3b9bc6c2dbd4f3cb026ec057f102f686fcb9b36729a4c793d886949c10adfb52b3aa4ca1f9fb9797c09ad17922b8aeac61d42ed47e5dcc4ba594730533aa1dfe584f0563a5817e30d150d4a463abe6ae06b0b20947c7501dab93291b514e8a019bf886330a3fc6958fcd0fd5cd247fd2e8f414d959c1db26b0736306365843dab414126ea4582f8e46a89408b920a6d1172d97e9bade0328209bd77397f8e7b11fccfe65e0f34509fcd04ec250235def83167dead69e4523c3afa0fd3f43915f234a0480f0645f07444650af7af8a546a60e06079b1356eaeb4d4186347def096f5905ea35fed3b4c11dc735a59b58e44af1c3aae359cd5ff8cd3f3c50b42c0691219c13e8bfcf18b9d1c8d7cb0bf1e9778cac90395a28380f71c857c4b97d0c32afd7d167a978c58aed1885973b005caeb08789513762431bd5fa0469b59bbc7b52313a849427c4bf24fac75ee34bad4d965671885f6a61efa1ecbe1e94406b1104ecc8ad0cb01d77cf4ef2c1f551aae46270c2ca445f6a166138ad7fc3e742b3f147db3ab4a9fa5848b60c16d25589bbcce6d598d53fbc9541734d3d6e44890099a569031601cfbf33a2e9852b8f6fc72211b0cca5a585d7b7f6db7b31581413b0699a576aac10a4ca8065b0b2b9009b61e8f63f13df0b2520f0dfb4b91c3641ee9c8da1899a93161f154cb43bc59326db224123dd3b67b81ebdba0135a90dd6191e769b5b7ce7e227815ca79b074a55d7b4dd1855457b22b674d7571397b71d5a8aa364c073faf8a884934b4bf075ed91897c8faed98e1dcc641fed5e6cd9ac8e9ba5ecf75c5b54d2cf1fc7ccac8caf8ab1d403e065a1463f2484a1b5ce8648135832457b2a6dcfaff8dec0141b3d25c56c156d75a089a40c6b5fa0bc48055530036abd61db1f05e7db5b662e6f4816e2c5c53806004e8fcb4de9b634d1aed9c02f8b561706100c69e6d6f9231c4b3ab2a3ed315333ad62e94ef3380f2d2b674e561bf0933a3452e68cc300fa034009288ac35b32915c8308d0b6bef48d6d14aecf8c4e6fa126b3ba29a9005b8a3463d8d8566ca5b1ba2fed93ad449cece45f2540023468e7373807e00ddd5e242c235404f515e17e3f978224c1a039fb2a955a57a442775d89c17265eecffc5a3ec5236226b7bbab5e483a2fb8113a545fcff37cbf7b62639aabe4010abb4543b7ca6f387fffba575428940e20d3f4d33ead4c9d9a93d3f91f720f16ef90929f4513f5a4928c6eb43adf9807bc983e204eecfd96d3bfe53a2b76bd91039ba019f6b5dcba54a11fa5f7f5ffec441001ebeb9b481c495a60cbbf728993accd02e11e452f31b8eac178f6b1f927046b3a8e2e4f267b50fae171ab7cb0dc0fe989ba118dd81021604ffd51968b940c87e73db7315004c477052deaa53914e789147e4839fa8367628d2c36672607661745e48bcd0942db6d6e7471edd1d618d9d30cb30770d60da7daedbeef2ee25b3e357338dd8dee5b60c1f1220a17e8d574593a968b7d5097b7218383a9b1521aa7ec339c2d61b103af514fc17e5e86e3f3d6ce7b3af1349f9db7ca1bb8689e023f645319d0e9e6d4da7ba13a7caaf1b6bcda3f2915622ab6f0d84e1bd5e7e76d032849bda09d9809530069ade2632b530888b30edf767a2681987358f7dadc7e620779c5855182a64cfd7bf9cac51eb411bd8e9b754d1c202abf0111ff960e34629b892a329d627733152e47a6aad8e7188777b4f3bb3be8c69a6a15b7e7107ccc328e0f419142cd823c6f023871e6fb3bf7305499f7163dca7753bcb6f323cb1c5ac257086986da7e689d399f4efd008934901e3d70f7732fa01bd65a3bc40f2706fe73015e8cc6a1e20f40a57bf2e35642767c616750498ef21e752bdacea7ca01c74e455a099e075948363dd25b53753220977405b81da8610c7eaf110bca80e0bb2da07bf3690784ef022399767b616491766dd4dffbb658ba39bca16c91f0b705d4836d076c2e4e610f8e3bd5b76a5d660fe103c450c4ff5eb1e7111c3c8e5ce883015b35f589e4331f3cf8e497c4a5bf4435bed18260a352a48ed8e6f2a8e5fb3ce713e7b0f324de742115869ec602e19c1fd730eee6e84f0ee0ad67702539d663b1898ffbce01c5e1d249eaab1ce52844ecfbe5e3ed2733650225b6f6fc26e2cb9cb641709d9637c64649a0f0cefe7908873a21719bf65e4f32c752693a1863e045b9c1f154a04c9786364bae98e2178c4c127fec169f33a5cb3a887aca94faa8cd652bc74ebbdcc4af40c257bb48490149c9c16c2c338faf5d4538739859bdeda0b6e0258b1dd3f94f8629e49e8c94c39e76899b43f543de3106f5b5b1d49c6e035c303fbda77bc451a576e0eb2a4e9052d305bf8eb1d10bc1e1557da39ef99470920774a113c1dd0f6df510135cd8227436fbd3ac5300ec87dbfb24fc17bf8f2e1b93abfd02ddce4e7f8fa2cde70e109e12cad888413fb45b088389c610bf813ab8e083ee4f9532720b006ff9d947b6da2bb010934159bcbbafc84db396abae966fa232e16821fe2b21d9c7b48bc15818b9d76c309fa7365d547d028b5828aca5e9b15586ca3e04f90bae6bf1b1cc579b80a1878cbfb6037f97b217e027f2591d8edf022885a26c17b235c371fae894a0e3a2f63fa27893b7d20bdeb27ea0526ad0a33fd4c96d2ffe5b45c2a82878fb5e98290fc6a7f32d35149551eb9c0096222a3d2a7d5335e85923e94cf72851fdd653a5be32db1da69f1f4c40e2b27994ea5c720c18d6e80fdd1c34caafc4356e9929b0b0d6ad9270ee1b3875f0cf8a789e689f02579b552385fd575c888d8e2d640d174903b83b9a6fba118059d2bc927ea67ef826ea51cef031bfeee72d1fa085ff09a4824d017d438e488ecce15c49110f2139f5c76196b5a0478cf272dbe06c67f103d5340cafd6111382adafc7a96c0069ca910e14c94ce3f244046df44883d6d8973dd6d81eb2617bd4a4c7157de12a7c6f8952a1894c6a42cffd096cde550372cd2a5ceba491cda932e954c6844ae2543f8c7768bedd57c3dadd2b86", 0x1000}, {&(0x7f0000000400)="413f363319a0f750c580da0b08bdb41f8a7eb0123e7a6480c32e3403294ca8a21753c9b1f80123e19db3e0f1d11e63011bf47a0fa0cce6627707892bb3c35dacc89e40a88645551690cc246db2d6257a4e3bcda9a7e2f61800d602859228ef2703e3f89b7a86297bb3093125fb9289954cd5f17f7c8d40e69bfcaaa8630f6583650da9f8f513af45ae638c", 0x8b}, {&(0x7f0000001540)="338c73aab8432a11ea399f5beaa403d17f0de2ce8cf5b3e871b1c443a4b10109fcff13ef05b3035b2f66b3e069bbc066bb36d8f20cd0c36fd2cf6cb954c3ee2f016359c7e7d3084a29b2d074aeeb7defa9913b10b1e20e5c3814b7f566a8b8034ef73554354b5a16c56b945dbdabadde3d214f84df34adc5125a594f3205d72c123fe0c709743813aba5bcb632a762a4", 0x90}, {&(0x7f0000001600)="163e6615be111798a355265c46db88a43fd96b1e0fb458a50faec886720205f85b97f2a2579ff2402a862a7e1e9300ec9c68add884a19ad938f59d68106e4e8915e2c0d7dcf68c6aeb73021bb4532d5181362d83d4aa13c7aa318223d2e52f537fb10e251cac8d277daf243c4e6bd8907ee39108d330e3105e27c1505bbae33c49584bb3192c22af8f2b741da1391f0f3a6ae21939e6c80e4dd032df6616144917a7414e731640", 0xa7}, {&(0x7f00000016c0)="264d3e0c3a2efedd5d9fb3a191bd54e77464742e0a08db15e8504cd972419d550b348fffcbca30d71278c4fd80a1aa674189246b40fb0b8842fb3127d8ed420d845519dfa7ece093f3fdfaa9059f5ebc274e5b02ead71e9de292ea74267a607d472543cfbac53068dfef622853e795adc205b2494d55ce9cc410afdc5d8b8f63744dd054564584d200b07fae62cc1e560c520ba9d44022d0814dcfd5661bb343fe5a1d30f8cd3a27213a3b5dbaba9eee9c4f", 0xb2}, {&(0x7f0000001780)="801b332f2fa7b548c6a79c03a186d30124cd8e51db0c7e2495b1a963e899fa3377d02769d75deac0b035cbd99775d5081f09f3ff2daa312cf8b114bd9d0dc93d0208d5e46843b499d23f72ccc468fb63e93a9623ce8f59b13c91b51635b3c27247d8f6d2714ef94ff44a", 0x6a}], 0xa, &(0x7f00000018c0)=[@assoc={0x18, 0x117, 0x4, 0x4}, @assoc={0x18, 0x117, 0x4, 0x5}, @iv={0x40, 0x117, 0x2, 0x2c, "4159dcb49ce29956268bfaea75c1c3455c694a86247e2f00bf8b9e2a98dab957fecdea1150b799f8b15663d0"}, @iv={0xd8, 0x117, 0x2, 0xbe, "f322ab5650bf5bb2bef1a62dbc9d459b284cfb37ced50aca7612773c2876e0494d3e65c653aa7fa18b1af6dbd51a71bb483b11538bf2a4da24b980c6c3da08b1fe242d38644a8a9c49970894f875911d4d5aa6a29873d70f0ca13de04b53f55d10c44be32a4cfca95a87513ee3ff5b5875702275a38ccc5cbbbf30a87affbf4e1bdb28817b9ae7d0df7effee79f7c3f8a5d234ea06c35f1e02c9cadc24369b186cb43072f03a1abf393659b813567b4404c1969eaa974fe29a48bc407b1c"}], 0x148, 0x1}, {0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001a40)="52f02b6afea6a13209ae1c0b8504bf7c3cec0d0cd259265d3408f9a15ffb16d3ac1c033840c5e1b3830f94773bd0609a6d95d6420dfeb46b7ee76c7d4b0cf74c7fb67655500a0461876aa668871f855bc737c8a641f2062edee2f033818b36999f3ba2888b3c3aa8188ab18ec88a3193a58a2ace162803ae08b3c8cd902a3232de846e17b77a6fc879676d26", 0x8c}], 0x1, &(0x7f0000001b40)=[@op={0x18}, @iv={0x108, 0x117, 0x2, 0xf2, "091ff0f29b957fea7253380778eb919f099f3a8b0bd2c9fd2c78a1ca461e97011b418aeabbe9bdf3c9fad1512fbc70b057dccbdda5272d332a50da0aa061cbcec4df13763ca32c511aff91994524040639def039070803f3c95aba36f26865006e5b1d23e107621c72abbb1c70eb23c9bfa0b132d94f9e8a5ed403231795415c9062e23e7af6a3fadac89b46df0d397d8b5356e61db73e6cc453d6b4f2e7a183797b85c281603ca3cbc483a72cfa119d5866a8109c82b3ffce699357ad49c69f035456d1a04f6d1f1f2710885608a07b787efc0a244a1035271832f6622d8375b1fb6c5de61bd94eaeb0c3a649b66c41c0de"}, @assoc={0x18, 0x117, 0x4, 0x88}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xa0, 0x117, 0x2, 0x87, "4385876d8a187cc3489602df99e059e6904eba183e96cc4ebf7d1eaf1af028b916e9e988ca71981da8ab1a2de53dfa6c1c8dfcd325cc3c48e66dd5f60aaf82338b608eca01d360927eb5ed24a1a9f6c44456fd60d1e246c5c4f20f9d3a8204505a2f3c01fd53eb2e3fc50414bd44a74900c9b39293047c06a93e0877dca1939ec87eefcc0d01d0"}, @assoc={0x18, 0x117, 0x4, 0x83}, @assoc={0x18, 0x117, 0x4, 0x3}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0xdbec}, @assoc={0x18, 0x117, 0x4, 0xffffffffffffff80}], 0x268, 0x20000000}], 0x3, 0x20040080) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xff5fbe55e4bbb550, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:30 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xe6, 0x0) 18:35:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0xfffffffffffffe6e) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000180)=[@iv={0xc8, 0x117, 0x2, 0xad, "0d28472969a21f904dbe78fd833e5e0ae92b07a4174f2083595e9039e20c70494102bfa3ed7d057e6c6d1abac837bd567c6989da1dc0018dd425744d54ad4563dbed4769f27fea81f0baf02b047b1130c0e17926ea56d7a2b8355ad0142ecad41f327ce5086203ab3de50d25043276336232ad226fee6482e439d61a327d4addfde1f101c31ffb153559d9a50a0b5ecb40d31b328cf06bae677ea2e5ad8412b34c3fc2fb75babbaf051ca99395"}], 0xc8}], 0x1, 0x2000000000000) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:30 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x3, 0x2000000020000) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000040)=0x7039d9a4, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4) 18:35:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x80000000000007, 0x402) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000300)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000440)={@remote, r2}, 0x14) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000600)={{0x9, 0x3, 0x80000001, 0x1, 'syz0\x00', 0x1}, 0x0, [0x66, 0x5, 0x0, 0x5, 0x1ff, 0x8, 0x2, 0x2, 0x3f, 0x5, 0x2, 0x7fffffff, 0x5, 0x7, 0x8, 0x3, 0x200, 0x1f, 0x0, 0x4, 0x3, 0x67, 0x20, 0xfffffffffffffffe, 0x401, 0x9, 0x1, 0x7fff, 0x8, 0x7fffffff, 0xcb, 0x400, 0xffffffffffffffef, 0x800, 0x4, 0xa129, 0x0, 0x1000, 0x101, 0x0, 0x7ff, 0x5, 0xdcd, 0xff, 0x0, 0x8, 0x3, 0xc1b6, 0x1f, 0x5, 0x5, 0x0, 0x0, 0x5, 0x7, 0x7, 0x200000000000000, 0x8000, 0x6, 0x7fff, 0x2, 0x7f, 0x3, 0x7, 0x5, 0x7, 0x6, 0x0, 0x5, 0x3, 0x8000, 0x3, 0x4, 0xd9, 0xfffffffffffffff9, 0x0, 0x2eb, 0x7fff, 0x562e, 0xffff, 0x40, 0x6, 0x5, 0x5, 0x1, 0x0, 0x9, 0xfffffffffffffffb, 0xffff, 0x7, 0x9, 0x0, 0x4, 0x8001, 0x5, 0xfff, 0x6, 0x1, 0x0, 0x7fff, 0x2, 0x9, 0x8001, 0x100000001, 0x3, 0x2, 0x80, 0x5, 0x4, 0x9, 0x1, 0x0, 0x2, 0x5, 0x7, 0x3, 0x4, 0x6, 0x100, 0x4, 0x3, 0x6, 0x269a, 0x9, 0xa0000000, 0x8882, 0x0, 0x5], {0x77359400}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r0, 0x0, 0x0) r5 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast2}, &(0x7f0000000200)=0xc) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000240)=r6) r7 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) r8 = ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r4, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) mount(&(0x7f0000000480)=ANY=[@ANYRESHEX, @ANYRES32=0x0, @ANYRES16=r0, @ANYRESOCT=r6, @ANYPTR=&(0x7f0000000540)=ANY=[@ANYRESDEC=0x0, @ANYRESHEX=r3, @ANYBLOB="1845288f447154030880cab34b7c6981212ef437a2f32ccea6ed192f93a4adeaef097ae088281dd0266ce0adf88c6112c5b7fe6bc47293faf40d87544f625590fd711882524d8cf326d2d3409c907c4331572a2f9823d327564cdf117955f55df6491b1b", @ANYRES32=r8, @ANYRESHEX], @ANYRES64=r8], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fusoctl\x00', 0x20400, 0x0) ioctl$TIOCMSET(r7, 0x5418, &(0x7f0000000280)=0xfffffffffffffff7) 18:35:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x2200000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x10203, 0x0) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:30 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x133, 0x0) 18:35:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1ffffffffd, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000140)="be1e852ad62c4cb5f155b8ede1457288b3720140b26dabe7f56ad148c5a32a0e815fc74da6e73ad5230e77") ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000180)={0x1, 0x7f775759, 0x100, 0x28a80000000000, 0x1, @discrete={0x8, 0x101}}) 18:35:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f0000000180)) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:31 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x200400, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x1) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x80, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x2000) io_setup(0x100ff, &(0x7f0000000400)=0x0) io_pgetevents(r3, 0xf31, 0x9, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000380)={0x800, "7650b5772e883f80f4adf34f60120cfe899acc5de683c203169f1f5b61458c24", 0x1, 0x1}) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x10001, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000180)=0x9, 0x4) getgid() ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r2, 0x80084503, &(0x7f0000000080)=""/181) r6 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) ioctl$SIOCAX25ADDFWD(r5, 0x89ea, &(0x7f00000003c0)={@default, @bcast}) ioctl$KVM_SET_TSS_ADDR(r6, 0xae47, 0x0) 18:35:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r2 = socket(0x400000000010, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000020002551075c0165ff0ffc02020a000000100f0307e1000c0800180000000000bc0000008f3943793a5ea67658cb22d90000000000000059b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c4831f65123819e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7a70723741b34981d1b182deb7904", 0xe0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ecb-blowfish-asm,digest_null)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0xe9, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x8001) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0xa0083, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r5, 0x80044326, &(0x7f0000000180)=0x2) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$selinux_validatetrans(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="737973746575646973705f72656d6f74655f657865636f626a6563745f001c696e6574655f5768696c645f657865635f743a733020303010303030303030303030303030303032303120756e636f6e66696e6564000000000000000000000000000000000000000000000000000000000000c7f937f3a7e8aa1faedc4a38c9ff5dcbe73dbc06dd71d4ad6fbfd28b8f2c9bf6a52248267e04b9b21ecf9524853683fa9ea01ff8d7410d18ce0b16fa6d6d83e82c8f8b2383273e12c5f8087f80b6aa961684"], 0x72) 18:35:31 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xc4, 0x0) 18:35:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x2c00, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:31 executing program 2: r0 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x7fffffff, 0x80) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000240)={r1, 0x1}) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r3, 0x3, 0x1, 0x81, &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x3}, 0x20) ioctl$EVIOCGKEYCODE(r2, 0x40084503, &(0x7f0000000080)=""/181) 18:35:31 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f0000000180)={0x0, 0x2, 0x200, [], &(0x7f0000000140)=0x7}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) write$input_event(r1, &(0x7f0000000200)={{}, 0x12, 0xda1, 0x7}, 0x18) 18:35:31 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xd4, 0x0) 18:35:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xfffffdc9) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x902b1b, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:31 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x2000) 18:35:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:31 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x71, 0x0) 18:35:31 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r2 = dup2(r1, r1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x2, 0x10, 0x3f, 0x6}, &(0x7f0000000040)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000080)={r3, 0x5}, 0x8) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f00000000c0)=0x2911) vmsplice(r1, &(0x7f0000000440)=[{&(0x7f0000000180)="4355ed9d8aead6a9f2a18deb07b45903a11ccbf5ad15e31b5932caa3e264e4a9ccb6bb7438c1dec24c51e1cad5092f9d40bed7d124b4550a472641ce17b6f4e18b577079dfea9f51ebb0f219368a65fed27ffbcd40425ba20db586261f7062131b0ea0924e269d912efe4e61e1417510b35fa5111574e4f5fd052e7c54a24f11c67c292de409cc487acc75e60dcbb3a8b89948bb330349042493fdfcc6cfb549d0c485a5159f4aee4eb25e6b31a6d8409cf7cc4e450cd7749b5bfc53cd854656d96a68d59adf945790657e0eccb45a6e734bf2e9534722fa170b91", 0xdb}, {&(0x7f0000000280)="c4bc153d6f7d72578e8073e1cacc2b7728885162a0047b577b7b7505224e28e17565422a032c2171ea1980cee9f6d018cddc461064c85e5f1c34ea51e475cc1b450711c964f45f5034746917aac72620c2ef93f7be5f8c88e2611cabe21aade27979de437e7bbea2b9d477b441fc974e744a5df5e04b979fec2d261125406ee4cfc8", 0x82}, {&(0x7f0000000340)="64bfc02ddc93c8a6b22a9b8293d3fc88c67ca5fe404964581e76100b4a2fe6dc8b1a78788f33e312548187188373f8294c9cd36e4e2db4a290188b1690a6998a4a7f52fe5e3a7e6ca206d22d818aa3e0b831050af855cd544318b5b98c8ddcbac7c300c78779b80590e80566b5ed981cd9c6944f1f673965f7eca415c21564855901b8d5ab27f71ebec5439a1465c1fa737043036b21eb821a381423d3ced9db083de638b979e2249b16318d61f0e4c7118a9f13c3b0b27bb920791c81df2595c322139b14f427", 0xc7}], 0x3, 0x2) 18:35:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x5f4a441baa41a000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:31 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xf5, 0x0) 18:35:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) uname(&(0x7f0000000180)=""/219) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) socket$xdp(0x2c, 0x3, 0x0) accept$alg(r0, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x800, 0x0) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000280)=""/218) 18:35:31 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000080)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, r1, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r2, 0x0, 0x70bd2b, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80c5}, 0x20000000) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x36, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:32 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000200)=""/181) 18:35:32 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x6a, 0x0) 18:35:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x180000000900, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:32 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000000)={0x7, 0x400, 0x95, 0x91fc, 0x8, 0x80}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x3f, 0x200000) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000200)) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) r3 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000180)=0x4, 0x4) 18:35:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x40000) setns(r1, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:32 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2000, 0x0) write$P9_RLOCK(r1, &(0x7f0000000140)={0x8, 0x35, 0x1, 0x3}, 0x8) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:32 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1de, 0x0) 18:35:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x60be55e4bbb5a0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:32 executing program 5: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x64001) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b0050c14c0a48c1369e5493238162d32168f2ae339f7a42e", 0xfffffdf8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x75eeb77545f52b7a) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f0000000180)={@null=' \x00', 0x5, 'veth1_to_hsr\x00'}) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x100, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x8100, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000180)={0x6, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @broadcast}}}, 0x108) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f00000000c0)) 18:35:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x6400000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:32 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8200, 0x0) connect$tipc(r1, &(0x7f0000000040)=@id={0x1e, 0x3, 0x2, {0x4e21, 0x2}}, 0x10) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:32 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x76, 0x0) 18:35:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x7fff, 0x24201) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000200)=""/228) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x2) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80018}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40800}, 0x8001) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:32 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:32 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x1, 0x47d, "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", 0xca, 0xfffffffffffffe01, 0xb211, 0x88d, 0x0, 0x1, 0x1}, r1}}, 0x120) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x6300000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x80000000, 0x7, 0x2}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r1, 0x8}, &(0x7f00000000c0)=0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000480)='./file0\x00', &(0x7f0000000740)='security.capability\x00', &(0x7f0000000780)=@v1={0x1000000, [{0x5, 0x400000008}]}, 0xc, 0x2) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000180)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000600)=[{&(0x7f0000000200)="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", 0xfa, 0x5f}, {&(0x7f0000000300)="60b16fda93f67c42e8fa103eccb243b8f0d9186fa23661102c256578f10239ff67505303a55c2b095f4e80c9663fc6e541448ade6de54748b7d9770e3d27a00bcc7eea4af4dbe2fc0ac9ff78ca73ec9f59c9072d49ef956e98659a9efaace0294c6889b688c34193cfb034790068bdb81d38db639c058b4144e98267ad57ab2b4fa947fd2fe689168a559d9318a1287bc37338570eb4448cc5ea1613d30a2b3cfd00ea4d3952975c130a885c5eda2e5a9f23d26897a029508335c399a5d90ad81c9141c4c342a2", 0xc7, 0x2}, {&(0x7f0000000400)="3e6c19ab00054d14cdac62a7638c119c64c01b4a104fb0a8c2b4a545d3791219861c830b69db0bea51da5729f60a0409831a6e2402037ed450b10ee756537dd5902459f4d00e3e5874dd2563de892076382b6d3fd58c7312fe67231df0b71a24", 0x60, 0x100000001}, {&(0x7f0000000540)="74a274142fe1acdd800ad4ed64dc462c4f37b623e1ccc21d1452a98f8d69806b697e806dfabcc3e6e211a24287ee0e89509ea30dbe0845170589892674fdec6c199af53bee30893d782ceb607160554ba331f6be5f778df5fbeef4f0d7d6243951d5939c52ca4248c7787a54831298daa0ef28bf68f5dd88baaa35ffc47e2bba7d04b216e4055553da229ada8e64aeaee3f31b4be14d2d", 0x97}], 0x40, &(0x7f0000000680)={[{@device={'device', 0x3d, './file0'}}, {@noautodefrag='noautodefrag'}, {@usebackuproot='usebackuproot'}, {@fragment_data='fragment=data'}, {@max_inline={'max_inline', 0x3d, [0x77]}}, {@noacl='noacl'}, {@ssd='ssd'}, {@usebackuproot='usebackuproot'}], [{@seclabel='seclabel'}, {@hash='hash'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@subj_user={'subj_user', 0x3d, 'skcipher\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'lrw(serpent)\x00'}}]}) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:32 executing program 2: socket$pppoe(0x18, 0x1, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x10000) 18:35:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:33 executing program 5: iopl(0xfe00000000000000) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigtimedwait(&(0x7f0000000000)={0x57}, 0x0, &(0x7f0000000140), 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xffff7165636e6575, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:33 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x9d, 0x0) 18:35:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0x100000001, 0x4) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000240)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r2}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000280)) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:33 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1c6, 0x0) 18:35:33 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x7ffffffc, 0xfffffffffffffffe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xccd31f311f, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x3, &(0x7f0000000200)=[{&(0x7f0000000080)="1fb17f78bac73d27b46f898fe92d41425795a0a8230a1883c8e33785531bb6f7dbab897ec5c1832383e5c353648fbe3aacff7cd7bc2911e4be501fb576041bffc041457f56dc8dcbd029f5cc681abfa22ef76f7ebcb6", 0x56, 0x1f}, {&(0x7f0000000180)="fc861799c1", 0x5, 0x4855}, {&(0x7f00000001c0)="66c5b7e1a29180a89e73a8", 0xb, 0xb2}], 0x0, &(0x7f0000000280)={[{@grpquota='grpquota'}, {@nodiscard='nodiscard'}], [{@pcr={'pcr', 0x3d, 0x32}}]}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:33 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000200)={{0x20, 0x42}, 'port0\x00', 0x20, 0x80000, 0x1, 0x8, 0x10000, 0x4, 0xafee, 0x0, 0x1, 0x5}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) [ 742.418735] jfs: Unrecognized mount option "pcr=00000000000000000050" or missing value 18:35:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x33000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:33 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xef, 0x0) 18:35:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, 0x3, {0x7, 0x1c, 0x3, 0x100, 0x6, 0x0, 0x1, 0x9}}, 0x50) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x40000, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f00000001c0)=0x400, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000140)) [ 742.602431] jfs: Unrecognized mount option "pcr=00000000000000000050" or missing value 18:35:33 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xe, 0x0) 18:35:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x26000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:33 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f0000000140)=0x1) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x7, 0x2, 0x0, 0x10001, 0x0, 0xff, 0x0, 0xd, 0x3, 0x6, 0x4795, 0xfffffffffffffff8, 0x10001, 0x5a2, 0x1f, 0x0, 0x4bac, 0x400, 0x7, 0x0, 0x4, 0xef, 0x81, 0x1, 0x1b, 0x7, 0x7fffffff, 0x9, 0xfff, 0xf9, 0x7, 0x1000, 0x7fff, 0x5c7, 0x3, 0x10000, 0x0, 0x800, 0x0, @perf_config_ext={0xff, 0x4}, 0x0, 0x2, 0x80000000, 0x8, 0x8000, 0xf6, 0x5}, r3, 0x10, r2, 0x3) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:33 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="bf2344341fb1ccab8fb13c5c4ed9a1f5f670adf7ad78f3d11670e5240baf1f6712448e98a264e932d9ac3f55c18aab4ecf43560035ecf3dce656c77d282b022bd82c41bae0d1f605070891dd3f6461b21f8f732a72ed84de92b89545094da003d23470a6cd028323a248120549e0b9df38464cdbaf0fcd250e96581994456da96e33cd6bd0e37295d0c27bf8c3e8b64219deb0e42bea1691b684f7bcb742d366bc35", 0xa2) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000040)) sendmmsg$alg(r0, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:34 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xc7, 0x0) 18:35:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0xffef) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:34 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x6e000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:34 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_rfcomm(r3, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x3}}, 0xa) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r3, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e20, @local}, 0x10) close(0xffffffffffffffff) add_key$user(0x0, 0x0, &(0x7f0000000240), 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) r4 = getpid() move_pages(r4, 0x8, &(0x7f0000000180)=[&(0x7f0000e63000/0x4000)=nil, &(0x7f0000e1a000/0x1000)=nil, &(0x7f0000b57000/0x2000)=nil, &(0x7f000003f000/0x1000)=nil, &(0x7f0000046000/0x2000)=nil, &(0x7f00003ba000/0x2000)=nil, &(0x7f0000a74000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil], &(0x7f0000000200)=[0x8, 0x1d, 0x56df, 0xe3bf], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000000)={0x400, 0xf, 0x100, 0x8, "d3a0b976a4ff41b9db4379d06f46715159d031086ba489389d8abcb07143439d"}) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3ffffffffff0600, 0x0) 18:35:34 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x144, 0x0) 18:35:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x3700000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:34 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x400800) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000140)=0x6) 18:35:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:34 executing program 5: getrandom(&(0x7f0000000080)=""/155, 0x9b, 0x3) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000500)=""/181) 18:35:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x2f00000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:34 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1b0, 0x0) [ 743.430528] audit: type=1400 audit(1546194934.557:68): avc: denied { create } for pid=25293 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_rdma_socket permissive=1 18:35:34 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200000, 0x0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000140)=0x7) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:34 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, r1, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0907c7bd811291876d0775b005e381", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500), 0xd5, 0x2001, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000000)) 18:35:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x2d00000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:35 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000001c0), &(0x7f0000000180)=0xfffffffffffffd93) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000140)={@mcast1}, &(0x7f0000000200)=0x14) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/dev/input/event#\x00', 0xffffffffffffffff) r2 = creat(&(0x7f0000000300)='./file0\x00', 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000380)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000400)={0xa, 0x4, 0xfa00, {r3}}, 0xc) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) 18:35:35 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x50, 0x0) 18:35:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:35 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000140)={'gretap0\x00', 0x400}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x400, 0x0) dup(r2) r3 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x100) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000380)=""/181) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000440)) 18:35:35 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000000)={0x3000000}) 18:35:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x600100000801, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 744.027278] Unknown ioctl -2120175988 [ 744.060495] Unknown ioctl -2120175988 18:35:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x403fbe1500000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:35 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x198, 0x0) 18:35:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000001100)="f32f4d39738595a8c9b6d04cb1b12f33f417c89be78e808b437f9381de0e81287f9f501b23822caa9884b31c250219bb8af2c093a76a0c27945c95f498633dcf216779276f806a81c43a6fdcde777707d3488ff11de667eefa33c9eda789cb5f4f315708e72fe555f55fef5e4be8c5865acc0b3f2c1f46fb213e8707b6ccbc06e60237242e2582f190ac9fb47a630856aeb92596cf70921bd31f7c76124a3118853f83c23284883f33a4a2ed113f6148a7c3ab", 0xb3}, {&(0x7f0000001640)="ac35645bf842422886b432668cf24fc0ac962974d45a8849cef0f59aab9543cad44ec205378c395a21e12aaea99730ee7cf7324099851376db98a35271efd3023147e74a00f7b95a6880b3e0417c889049f35eb3709990390e82c41ae775e083097958a1020b6a53cc821b8ea4a839112b8178274133f56f8d2b46d9eb9da7b58d75e18e50e899884e783466a64a71330a94a4537f029aa3e3815b1a09930036ac73b596cb35a2adbda3e233f57d6f9af2", 0xb1}, {&(0x7f0000001280)="b07de1abb39c50184309600052796fe0c27463203584421fdaca99bd6bc65baeb26c0fd53b0a03a33c9d0c33cb9afbcb3e8eca315a6be44036f86e02f0f36e1ca7f831063468fd442a62f34c9f9b2fda3f236d4a3837ea6c47e48d12c9dfb87b3c4d7804f6834d206c6d6d19dc8a9247b265388faa4eb9b49e07ca3f2a5a75215c5d54e9acb4624ba1190e4c1122dcf58953f8bc85d7c3be095821184f2b7d77352c34e06807ad19cfec4f796842d1af3443076a0f5388c2d6a111b098a062fcbd2aac3ecb7947c478be9e115a7eadab1dbefeb535f3ed0311f1c9b8acd7ef69e1458e5c", 0xe4}, {&(0x7f0000000000)="5e757d2999", 0x5}, {&(0x7f0000001380)="7c9421523657d7b0a9537c1995df762a85e27ce6d2e1b1baaacedc0bef2535e21f668f8b63d3323ca033668b8daaebfe23fce7767cdcbf7603b38135a5e50022f1a24bcf4da55d717dcaab1e77b490d46ba71d0542382db3733153dfd6f1eb2738094f81fd66839a544c1192d8a194fa1f388a0b32d09303f6ab7303d30eea1d4083f21a350bdc8684459a92ef0b6d3731fb2cc940e65907df4b6e775d5afe79f2986fa7860132f3e50dd39d978b45c77fe39b925a052c9a6faa0e0ace4db48676b97754ba959a6d390c1eadfb0f92b6a609bd8cd65a04ed3458196be6fe5ba59988f685cd1ff528f15ba8ad1a098dbf", 0xf0}, {&(0x7f0000001480)="35d94dd9455ef3e4f3fbff9422ef609b9ff6dc1a5646dbfd0d728c071c6116245a60b81cf1971e3400230f38172c914d", 0x30}, {&(0x7f0000001700)="fd405f5207ee37719d5c23525cfe198e1a0c273dda1c19028c7a4f0b966fc4f410251d4d24b540398953a2f43defb3ce00787a11cae2caea69269fa14acbc3e51a60a9f1a1edd1397dd0d7b6ebfa3499b69bdd5d", 0x54}], 0x7, &(0x7f0000001780)=[@op={0x18}], 0x264}], 0x1, 0x80000) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000001200)={0x7, 0x5, 0x2, 0x0, 0x0, [{r0, 0x0, 0x1}, {r0, 0x0, 0x2}]}) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000fc0)=[{0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f0000000000), 0x0, 0x800}, {0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="ef930b1e33d63d0fed4e139b4baed8d28682f4d7431554a76d74e422cc", 0x1d}, {&(0x7f0000000080)="b559eb82b001191c629ef43e2665c98aee02c96af410c314a664d9643340dea0a7d164cfdbf138ce8ab09d1227155319a0e0176a2c5bfeff7c720d6d8108e0aa7b117bbfea766853c40e312e1418b5afee889ce68b30a82c47dcef878837d338801e13323855", 0x66}], 0x2, &(0x7f00000001c0)=[@assoc={0x18, 0x117, 0x4, 0x6}, @assoc={0x18, 0x117, 0x4, 0x4}, @iv={0xb8, 0x117, 0x2, 0xa4, "437f0fd76a548157e65acfdf71c1242714d338e3d524bb7186c0d1bc6c67d8d1f1d0fcc94c2449dfe3f6c954620d4c8cd40d743a1d45f9ef8efa30b5859f401820d604709169fa5b472c446af11d32337d2b84d5f5fe3e175b5122f96992e05a69419aff970b455dc80565960ce701bb00b392523a6dfa50c211862152b3e291c5b15cdbca554b6259aa52bcb3ae67ae796300158eab7f78f32520544db04f49b07743bd"}, @iv={0x60, 0x117, 0x2, 0x47, "0d1b53859c36c6282723b09d1ea8037e556b35ec2d37d6bc21194ab33bdda898fa1b4eeaff3e46161e52389f2a81805a08ae76f29d331b9c872c92099d94563fc22514c747cea6"}, @assoc={0x18, 0x117, 0x4, 0x6}, @assoc={0x18}, @assoc={0x18, 0x117, 0x4, 0x5}], 0x190, 0x1}, {0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000100)="50e518871246fe", 0x7}, {&(0x7f00000003c0)="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", 0xfa}, {&(0x7f0000000540)="5a70bf7c671f40f0972e66383227f25d6900dbf90956f9bad5c9766bd1bd272b2318ecb59dd50c77316a48a864d173a4f072dc15a4a8f17d05810a0796e86a71bd37857e0d75bc85ca607895305062c73d5cf63b78f1e09f4b8e53ccb105a358c80d3588c3e49b646a962cb0750ebb", 0x6f}, {&(0x7f00000005c0)="bc8db71df110d1d9fe5c5c0b76fe82f2cde73b5e524bdbe099842cf73d73ee37599c0cf3717011f3a2bcca70cfcf59b0f9e96e3ab2ef548fdfaee13983c8dc21bd8e06be852c0e446f1142563ce8e1a59ab6183006f77b6b3eb1a8f87c1aab2efc73ab8ee2631d218ab01a1e5e838d3e30d5cec6d53b2fccc505028fb91d8e6f2ecd2ce74c421823c9d75cd1af4d57daeadbb6f97aa40da295ecff1923b8461792d9c71b5b1d99302882861c2630a47f1e2d32a8817b3b30d125e1c45a5a47c09f1948a672a0cd712c6ebc2c18414b32ba92acd567febef10e58b8a074ff3f01cf1a0e61fac3d6af79ffa7", 0xeb}], 0x4, &(0x7f0000000700)=[@op={0x18}, @iv={0x70, 0x117, 0x2, 0x59, "270ed6b695e3616ad1ce155646860ae7f1955d4b0e9b7e18a2a4c1621da2469bebe2053766a8b996752eee7c807cd0a57fb6f4474308cd41edc5e6313ba442eb7f6cf849d980b177b8dccda0a5a1fd808daa7e441cad6d2796"}], 0x88, 0x8000}, {0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="4cfd7b34f4d384cd46c6eea2719d05380000000000", 0xfffffe7d}, {&(0x7f0000000800)="5c2764eb748936daaa92bfb615f85adc4af981e6b2c81c2703825ddd8f60dafa80b3335253c1eb4b546160ba7d39cb532c0d3f898f7406eb92fc380746c8116f24f310c4e060e23145f0a0f52457fbfdb201ebe4eddf2ccec94d0c4089b1a1793f647544a879a3cf5c8a7a7981d3beca0438", 0x73}, {&(0x7f0000000880)="df8b3e3fbb3b4d3910ce70ff7d363a4e5191f13ce7ab279ad4b83522316f27bce02ef0844188520a8c8ee9bbcaf41b9281195bde05b0e00e22081481d607c594c3a06ced0dcd4e132b53adb46c8af638566fe02e8977936a947f4abb21a92d84e2370ec0c5fade23093fc6115564893c61ea23d62eba2b68657c816f05c0fba7da3def4ae305bda9dc4dd4f8db0ee22092a1cf3cf6c9fd760935abb5c370dfe6fa47ce4d4e8a26e5", 0xa8}], 0x3, &(0x7f0000000980)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @iv={0x28, 0x117, 0x2, 0x13, "28b61c3d413a10d8eef990c372a210b921acf9"}, @op={0x18}], 0x70, 0x801}, {0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000a00)="bd9e2066bc52c2c40053d0a1bb1382db883ce3d6b9abc31b5b9b8e520ed042cf30e86d32a12cf4bbbc722561d64b312115a4efddee10684dec2dd32bbb5570f256e502d84451956cebc11abe6ec84dcb793854506418a8371b5fc1aa234cac64d34e89d4139b8e334f8a874cc2ddf8506d3acf1383dc2d9382917b45c66ec3136b547ccf7bebf0fb2c1e592e31ede29fdcb8b08ce3cf86abf00dc456a85b49f5d8541c58dc6e712df7486fe5ca38430b0a3ee48da8069792bc4326b18bbf531f0a3b517858de87a048961680fe963f64ce1bdcf168b3cb65673f1726cf3b9d9ea3802d", 0xe3}, {&(0x7f0000000b00)="a1f263f0fbffdeac3ea9db2f251cf8047cee3a813974a680db9c4ca0cd4b919f80850ef3f4d6e67747373fe5020cdb45889d6f921287b6b36d5f2582beca8982c8eb1fddf86ce26faa3d4fe31bbf86631740101dd2dfdf0f16844d23e4796d631754e0e966db728367e0164af6c7b9a534c6b1db620fe2c6c44b7e7a23393e43447700686b0233d5ee25a338c3ce7c8c3fdd8fd90401ce969bc2557072e6012cbbb8d1c14db793ff7e91836bd2b309ca3d82ed69060555ccc29ad5fee920b39fafb59c754f4ca8b2e8d7df931f11736ef08a89d64e20c5d95a4b208c15eb523dca37ffaa51f4ff9feba6ccbfa8", 0xed}], 0x2, &(0x7f0000000c40)=ANY=[@ANYBLOB="9800000000000000170100000200000080000000771f8d13692bbeae8a3c861fec95027428041205f344dd64b5d69273c04e8c16391fb52a4712bb2b4b35e6189fdeb9de84643f32505c2970447cdb2db13122544ae9bed45c817de2f5a973ecc140d06bbce19cad9c7a20ec6964adebed3b3aa1010e3783f598615a8d2555cf5e5111d0d39075f09831c27e14e63d3304cf99ab00000000180000000000000017010000030000000100000000000000180000000000000017010000040000007f00000000000000180000000000000017010000030000000000000000000000180000000000000017010000040000000600000000000000f8000000000000001701000002000000dd000000e4025f9f138fbb7ad276a41f0e116a65fa7148fb50b43bdb4cffb7b167454e61f66a7aa8e6a4ed090c04f1d577864417059f362943072774cda3973cd2294f4e395bd7ca145e1f73995517bb25696833ac02a14015112210febd2ac886ef9f98c780d04cc97aef1762c3b257fb498e24c75f8d6115d9a5517bf60808765f162055a5988610387ead6e4ee81c32810db201e4ee46d4851fe9ee6d521c75bfc65d23acca9af910d8ddecaf329bfc0536f0ff856f6765c2bdd4b9b45279b86bcae85513c04f98bee71126b727a71083e3b0d74b3b1ea11a52e89a8de09e2a9c01ece3c19f7390000000000000001800000000000000170100000400000092da00000000000010010000000000001701000002000000f6000000cb347d624b5f78dcb48add8ca0887cbf236da60a80438bf8a21ad8c72c0933d190c5c6cf462bda5faded7e7d0bfb9de97db3f40329d0f1c911b2581923941aea628404d44cbebbc40dbf5a914c805f8d73e4071f6efdbd3a66e804a6170a3a91ef15b6f6638d917dd3d73380605348887bbaf4e937e5bfebdf30191a12f0a69a808038f9d5a1c48338a10e17328316e05436c2cefd98ee05e17aca1bdefb1d3e91de066080c9bf045b34fc6085275f5625c8b052928120f26f771c22a6e4c249b972a90efb2b1bb7e731454df9358feb2c3c260e9e2c65eeabd2f0d8f8de5180d26edad54406fdbcba9ccf1596e8a31c28a0d377ad0000000000001800000000000000170100000300000001000000000000000000000000170100000300000001000000"], 0x1a0, 0x4000}], 0x5, 0x24041040) 18:35:35 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) [ 744.139187] usb usb5: usbfs: interface 0 claimed by hub while 'syz-executor3' sets config #50331648 [ 744.176472] usb usb5: usbfs: interface 0 claimed by hub while 'syz-executor3' sets config #50331648 18:35:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x2800000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:35 executing program 2: get_mempolicy(&(0x7f0000000040), &(0x7f0000000300), 0x8, &(0x7f0000a3a000/0x4000)=nil, 0x1) r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x802000000000, 0x800) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340)='/dev/snd/pcmC#D#p\x00', 0x2, 0x10000) ioctl$VT_RELDISP(r1, 0x5605) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/checkreqprot\x00', 0x1e1202, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x11, r0, 0x0) recvmsg(r2, &(0x7f0000000540)={&(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000380)=""/3, 0x3}, {&(0x7f0000000880)=""/236, 0xec}, {&(0x7f0000000980)=""/189, 0xbd}, {&(0x7f0000000a40)=""/174, 0xae}, {&(0x7f0000000b00)=""/85, 0x55}, {&(0x7f0000000b80)=""/103, 0x67}, {&(0x7f0000000c00)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/127, 0x7f}, {&(0x7f0000000d40)=""/238, 0xee}], 0x9, &(0x7f0000000f00)=""/170, 0xaa}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000001040)={&(0x7f0000000000), 0xc, &(0x7f0000001000)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="240000002a0010032dbd7000fedbdf2500000000", @ANYRES32=r3, @ANYBLOB="147c0000000000005eb20000"], 0x24}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r4 = creat(&(0x7f00000003c0)='./file0\x00', 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000180)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) r6 = socket$l2tp(0x18, 0x1, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000001080)=0x6a) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = syz_init_net_socket$ax25(0x3, 0x3, 0x1) r9 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f00000005c0)=ANY=[@ANYBLOB="88010000290001032bbd7000ffdbdf2500000000", @ANYRES32=r5, @ANYBLOB="0500fbfffffff4ffffff0b0008000500030700000c0001006866736300000000440002001000020004000000400000000400000010000300060000003a9effff060000001000030001000000580200008000000010000300ffffffff08000000050000000c000100686673630000000014000200100002000080000001000000060000000c00010064736d61726b00000c00020008000400020000000800010061746d00a000020038000300a037845cbbf34043f110c094f59ba756ca025cc282413fb3ae552fea819ae953e7c2552b01128195d7d1be521302857403322dfe0800040009000f0008000100", @ANYRES32=r6, @ANYBLOB="08000100719c4d8c13c691fd634ff5206fe4a5cd4d7acf2d7459b29f1a62320b24ab1c9d4f62857b24ec520991dc507c96519ec888d9290e5ca7c64d657666e0eb0458b560b30c34b465408add20bc44882ce5d3452281541a284f3d6a7ad73d975600969dab67176b667697f3101842b3dc18acd23cd4c4ede3c37ab04cfd4fda0c22d653f529f78b9b2ff504cc85731711822959be78b026f83f0756db7b6484b2b86e80ddff4a436525c92497d6193515a26474dd7cb9882be4de851eb3036387ec8f26d6e6cade445979c444ce1cad2aa0cd6dbc2767fdda07ebff7fe2931143a5d4cd1a61f2f32bf9b8d68c96e4104b91563d8fe22fa96d95af9464562cd5265378c7b4ef82dc5b", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="3c000300d477d92bfef027ff0cb15009a4eccc22fb57e0e3e1669ba562f02187da1f39fe39f7d7028d006ff67ed89bd91336d3942c326be291bc000008000100", @ANYRES32=r9, @ANYBLOB="08000500fc7a000008000100636271001c000200180001001e010407eb040000000000800900000001000000"], 0x188}, 0x1, 0x0, 0x0, 0x5}, 0x800) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000580)={0xff, @remote, 0x4e22, 0x0, 'wrr\x00', 0x0, 0x7f, 0x3c}, 0x2c) 18:35:35 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000000)) 18:35:35 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x8000000000000000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}}}, 0x90) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r2, 0x80084503, &(0x7f0000000080)=""/181) 18:35:35 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0xffffff03, 0x3, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 18:35:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x6a000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000000)={0x472, 0x7fff, 0x5}) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:35 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x16d, 0x0) 18:35:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x2f00, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x10001) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000040)=""/148) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:36 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, r0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000240)={0x3, 0x1}) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) ioctl$KDDELIO(r1, 0x4b35, 0xfffffffffffff30e) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x100, 0x0) ioctl$VT_RELDISP(r3, 0x5605) getsockname$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000002c0)=0x1c) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f00000001c0)=r3) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000300), &(0x7f0000000340)=0x4) 18:35:36 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 18:35:36 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x153, 0x0) 18:35:36 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2000000001, 0x2000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) socket$inet6(0xa, 0x803, 0xfffffffffffffff8) 18:35:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x30df2af2dd5a00, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xc7}], 0x1000000000000140}}], 0x1, 0x2101, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x1, 0x0) ioctl$TIOCNXCL(r2, 0x540d) 18:35:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_procfs(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vsock\x00', 0x0, 0x0) socket(0x0, 0x1fffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2720, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000000)="360fae08670f01d1b8c80e8ee0f2a566b9af0300000f320fc75ac70f019af5ffba210066ed0fc79e9c5ebaa000b80118ef", 0x31}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:35:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xf00000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'tgr192\x00'}, 0xfffffdd8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:36 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1e6, 0x0) 18:35:36 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x32, r1, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:36 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x7, 0x8002) mmap(&(0x7f00009b7000/0x3000)=nil, 0x3000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20000, 0x0) epoll_create(0x2) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 745.552918] *** Guest State *** [ 745.566891] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 745.615342] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 745.674483] CR3 = 0x0000000000000000 18:35:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x65000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 745.700557] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 18:35:36 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) r2 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='*mime_type\x00', 0xfffffffffffffffe) keyctl$invalidate(0x15, r2) 18:35:36 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) connect$bt_rfcomm(r1, &(0x7f0000000140)={0x1f, {0x7, 0x7, 0xffff, 0x6, 0x3, 0x101}, 0x46}, 0xa) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000180)="22c5d807fb4665507137e6410a5dce36dc05a7509417995a51c2c8bbd4ca66564be456db9c32e5ac77ebcbc11c2a33578e494f4f3d92158a975f79cfd89f7a4f4a47a6678bb2aae79fa1d0b3be3834b0ee7d8e036f40aab07c34c869175919211c6f42386dbef243bee87d3076b8defbb6db883e6db759c27436a9ead32765dd4e6209206f1f387efee191886e9d57dc5663e160b7dfb14c94e1274d55933fbe025dcfb787082799f99375334d7e5c2764f255dfd09dc814ed9f9e05df2ff4219b10603e6ae69c8736f5dd674238e757760ccdb54878cac2ab2700dd652d5d9a05d03daa717c90145dc77bf5d0cada579dbe86163ab1023d9a2878d66fa55d9f") [ 745.745409] RFLAGS=0x00000002 DR7 = 0x0000000000000400 18:35:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.current\x00', 0x0, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x1000) r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000180)=0x78) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) bind$isdn_base(r3, &(0x7f0000000000)={0x22, 0x557b, 0x3, 0xfff, 0x100}, 0x6) [ 745.800581] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 745.899004] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 745.946048] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 18:35:37 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x132, 0x0) [ 746.000436] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 746.030984] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 18:35:37 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000140)={0x40001, 0x0, [0x2, 0x80000000, 0x400, 0x7fff, 0x7, 0x7, 0x4]}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x40084503, &(0x7f0000000080)=""/181) [ 746.066844] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 746.177833] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 746.199330] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 746.216316] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 746.251500] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 746.287101] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 746.353988] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 746.380822] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 746.392705] Interruptibility = 00000000 ActivityState = 00000000 [ 746.419305] *** Host State *** [ 746.443238] RIP = 0xffffffff811fd350 RSP = 0xffff88804a4d73f0 [ 746.449263] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 746.472189] FSBase=00007fc53aea8700 GSBase=ffff8880ae600000 TRBase=fffffe0000003000 [ 746.480405] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 746.486417] CR0=0000000080050033 CR3=0000000084795000 CR4=00000000001426f0 [ 746.493682] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 746.500621] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 746.506789] *** Control State *** [ 746.510469] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 746.517166] EntryControls=0000d1ff ExitControls=002fefff [ 746.522805] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 746.529905] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 746.536583] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 18:35:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x6900000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)="e3f4690bbdcbdd0baa90548d1d61cc0b23d675657baa17", 0x17, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r1, 0x4d022292) openat$capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/capi20\x00', 0x10000, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) r3 = socket(0x1b, 0x3, 0x3) getsockopt$llc_int(r3, 0x10c, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20100, 0x0) setns(r4, 0x2000000) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000040)=0xfffffffffffffc1d, 0x4) 18:35:37 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x400) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) ioctl$VIDIOC_STREAMON(r2, 0x40045612, &(0x7f0000000140)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:37 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xa2, 0x0) 18:35:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_procfs(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vsock\x00', 0x0, 0x0) socket(0x0, 0x1fffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2720, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000000)="360fae08670f01d1b8c80e8ee0f2a566b9af0300000f320fc75ac70f019af5ffba210066ed0fc79e9c5ebaa000b80118ef", 0x31}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:35:37 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x9, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000140)=""/181) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) [ 746.543349] reason=80000021 qualification=0000000000000000 [ 746.549854] IDTVectoring: info=00000000 errcode=00000000 [ 746.555304] TSC Offset = 0xfffffe6e96724646 [ 746.559808] EPT pointer = 0x00000000a8e7601e 18:35:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x41, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:37 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200, 0x0) accept(r1, &(0x7f0000000140)=@sco, &(0x7f00000001c0)=0x80) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x50280, 0x0) 18:35:37 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200080, 0x0) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000000140)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:38 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x28000) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) socket$inet(0x2, 0xa, 0x3) 18:35:38 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000000)) 18:35:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x64, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:38 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x3d, 0x0) 18:35:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) mkdir(&(0x7f0000000180)='./file0\x00', 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000001c0)=[{0x0, 0x0, &(0x7f0000002a80), 0x100000000000031e, &(0x7f0000000100), 0xfffffffffffffe34, 0x20040000}], 0x4924af5, 0x4000040) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000200)={0x1, 0x0, @ioapic={0x1, 0x4, 0xd0, 0x800000000, 0x0, [{0x2, 0xffffffff, 0xffffffffffffff2b, [], 0x4}, {0xb860, 0x7, 0x2}, {0xcb, 0x3, 0x2, [], 0x100020000}, {0x20, 0x9, 0x1e9c, [], 0x2}, {0x10001, 0x9, 0x1000000, [], 0x80000000}, {0xffff, 0xffffffff, 0xffffffff00000001, [], 0x1}, {0x9, 0x6eed19c3, 0x10001, [], 0x1}, {0x1000, 0x1, 0x0, [], 0x8000}, {0x6, 0x1, 0x94, [], 0x1}, {0x5, 0x1, 0xffffffff, [], 0x1ff}, {0x6, 0xaa7, 0x2, [], 0x223}, {0x2, 0x8, 0x2, [], 0x1}, {0xfffffffeffffffff, 0xfffffffffffffff7, 0x3e, [], 0xffffffff80000001}, {0x4, 0x401, 0x0, [], 0x2}, {0x7fffffff, 0x0, 0x3, [], 0x7}, {0x67, 0x7, 0x400, [], 0x6}, {0x0, 0xfffffffffffffff9, 0x8, [], 0x6}, {0xfff, 0x8, 0x9, [], 0x7fffffff}, {0xd69, 0xbc, 0x8001, [], 0x4}, {0xffffffffffff64da, 0x6, 0xffff, [], 0xfffffffffffffffa}, {0x9, 0x6, 0xffffffff, [], 0x5}, {0xd6b, 0x101, 0x48a, [], 0xa0}, {0x3, 0xffffffff, 0x7bf, [], 0x9}, {0x3, 0x100000001, 0x3, [], 0x1f}]}}) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000000000)=""/229, 0xe5}], 0x1}, 0x400}], 0x1, 0x0, 0x0) 18:35:38 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, r0, 0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000140)={{0x6, 0x4}, {0x81, 0x4911}, 0x7, 0x1, 0x5}) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) [ 747.191009] syz-executor5 uses obsolete (PF_INET,SOCK_PACKET) 18:35:38 executing program 3: 18:35:38 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x53, 0x0) 18:35:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/181) 18:35:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xa0b5bbe455be6000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x8000, 0x0) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000040)={0xca1e, 0x3, 0x8}) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:38 executing program 3: 18:35:38 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2000040000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = semget(0x0, 0x2, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000040)=0x5) semctl$SEM_INFO(r1, 0x7, 0x13, &(0x7f0000000140)=""/79) 18:35:38 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1d5, 0x0) 18:35:38 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r2 = accept(r1, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000000)=0x80) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xffffff03726573b0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:38 executing program 0: syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x80) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0xfffffffffffffffb, 0x40) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x22) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) sched_setparam(r2, &(0x7f0000000040)=0x8ab) 18:35:38 executing program 3: 18:35:38 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x5, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000140)) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000240)={{0x2, 0x101}, 'port1\x00', 0x8, 0x1000, 0x8, 0x6, 0x1, 0xffffffff}) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000180)={'broute\x00'}, &(0x7f0000000200)=0x78) 18:35:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x3bd9a07c41510dc8, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:39 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x46, 0x0) 18:35:39 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x2, [0x0, 0x0]}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={r2, @in={{0x2, 0x4e24, @broadcast}}}, &(0x7f00000000c0)=0x84) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000004440)}}], 0x0, 0x0, 0x0) 18:35:39 executing program 3: 18:35:39 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2000, 0x0) ioctl$VIDIOC_G_SELECTION(r2, 0xc040565e, &(0x7f0000000200)={0xf, 0x102, 0x2, {0x7fffffff, 0x4, 0xfffffffffffffff8, 0x6}}) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0f0306a2fe0100009b0000000700000011020000faffffff00000200000000006b92a87389bfe9260a9c0a6b438e43d43c9bfe3b9c63c70799879a16ba8deec38d58249e5dfd86adf2497534"], 0x4c) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:39 executing program 3: 18:35:39 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x7, 0xff) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x884, 0x200000) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000140)={{0x9, 0x5a0a}, {0x9, 0x2}, 0xffffffff, 0x1, 0x2}) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:39 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x21, 0x0) 18:35:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x54, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x28, "ed4d3143f3683a3e9eef83bd08ded056b7d6017a9d96dd2ae2f008bfa42f903a3daffb4690b65f8d"}, &(0x7f0000000080)=0x30) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e24, 0xffffffff, @remote, 0x10001}}, 0x7, 0x3, 0x0, 0x1b1, 0x68}, &(0x7f00000000c0)=0x98) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:39 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f0000000140)={0x4, 0x7, 0x58cd, 0xffffffff00000001, 'syz0\x00', 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x2) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:39 executing program 3: 18:35:39 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x7f, 0x400400) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000240)={r2, 0x2}) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64MMAP\x00', &(0x7f0000000140)='/dev/input/event#\x00', 0x12, 0x2) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000280)={0xd, {0x6, 0x7, 0x2, 0x7f}}) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:39 executing program 3: 18:35:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f0000001540)) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x4, &(0x7f00000003c0)=[{&(0x7f00000001c0)="aa7fb89387f54267480f6600d76dedd4e66c2ddcc3946c6da886eaa731a2", 0x1e, 0x8}, {&(0x7f0000000200)="fa64a9ee91aad952aea9b7598014955d75ca43a16bb880be992d1a21bc8f8769eb64ba312ae2e0335cc2a6612d1610c698405007c2a06469c8a4ea3273443fe490aa42f429f86354912592da6a857e17e46cbc11fd22a751bbed9e78774a92fbab926de5d7dc56e02b547d47719d18e9cde34f861a86a4745db99be08ac88b272bda327d254f570b8288233bf3300edbca708aff661be744db65b49fccd42539e6099a47e0ef1372", 0xa8, 0x8000}, {&(0x7f0000000540)="f4b653f5635942b6524819a98c179be5393737e27c53be8167f3e083abd49e49f290730d9c5513b900632333d7870ffbc22f97d909e9772be3a14530aa7f0ac634c886bfd0afbfe34daeb468367462e2bc033f0cb652c92887a3ac6e9c3a9d91d498b9150606563ece2fd4778b5a09aad0928334de8061af0a3e9831638aad6b3a1f859bd9451e2a1ccda4b7faae97bb18d32ae66ec72ba49a46058b03820704af53d95ae8458594636d3d6c20411441f2b5d6c134b5c2d74040c134049cb062822d8c3131903dc3d33e573e83fc1659dc8ad90477a93f021a250965b9a6aadb0901c9df34ed57336fd6547ee799481a68600ebc6efab79a923cb51a6a6a0363c9faa306841ea4ac27a2b8b3a2d6ed5116c56625b724c20b5bb7301294ba5963fee37973416b44aad7a1c4e909a1014138505f07027a723fe9f391d32254723ef69a277f0449e3a97850f4cb89b799dc652ef1c8f5f46379a898581979f800da2d0cffe95fb6ccaaa44932309f9694ea986a0e53130baf42eb93e21c1e4ec870e02bb0cf11991d46cdb4be50c5ea80efd2832feb9cb1b30bff033ad194bd430329c059148ea06adfcb655ee970ac7c6bae9ee483343af32e4cbcee52017eb6de8593208f41f24eeff262fc50bc6d88141db3576e1164ed0069346b6e4e4a9457aae44c7969e072e3ed4d994da59d37541dfe2ac142887e7dc64a40d9fdfe7eb4d67a5d3164bfb6a5380ab4ffad661695d1afd27f5d6549f92a6f1356cc8ba3d0a09ce0ecca2b827ca63b41f89dbbe634957c09c9ca4cedcccd1295f4f7e46b71cb38b77bee4655d7f389bf66f95c3b7cd93d7a16937734d665e56214594d4f8d92b823552238abb5c2c141e43015dd3a1164ee7c3c1d38339e85ccde053de0877a0c77aba826c4afa50ec7baa32e4a8aa07704bab988c401e713e568d0cfb0b5b85942ff9a5b9400bab36c7146f7a0ff0668cd106757c8f28277d4fb230e3d510467b4eb8a8b79c15e203479ad0b29867109c7fe10a2a2582d8b945fdb69d8c234a24f30b42f8e0acd0eec651de606ac2ad5cabb4194840d2af2d89dd0aca2e7a8f6591207c71de1ea03b6601b11407069ad3b91e72697f6e5f93fb89b5dc898c35de003109b291d3782ae9752e2e5805b79a05796092e9ca1afa1fa9f4796ef355e5b3db722805da221917c8e3fffd4d1daf42575a6e0e814a9a32ad0fcc004777c43ff3537235c781e9904ea469e6553f9deda79e443066cf2d3d69e8a78dc1d8bd830e781c80fd5626ed67f067e18d8d91379251a66ada337e1e90e166c4024c7f609039c313c52dcde6f1f6aab15e3aa2238f3fed43d9812cce56947d1cd0c06512cc733026d3bb5a87391b8f8d5bb13bbc7f639cd6455413c53c8757b09b221d9d8972de86f0debdc594a5b59ab46638eebe1673b8e0e08e0812360ea2f6d83ea585bab744f7389db49494d1750858d7a8d4dfaf6699ed855b8dfd1f0c5048a3d7c8435158a58e14afc252472e64c1accf168fe9b9252a3f0fde1e6399064a7f2093708ed1bea3bfd4698d69cb3ee5f209dc6359f46a7e3fb8f7a0cf4d54e2f0b58e52b4b19f3c8a85190e69291b34afca1647f304ecc8b7565908e173f0133e5a906fc60e942adeb709185be0d582755a37cd54d95226a5666bbeb774a518f5402bf7bf25a37639ddb464a93457e9fde898038729722b4f037bc6ff73ece06ff44709eb397fedaf7fdfa4781e232fb828e49ff66a0f20793adb1714073e132be63eebae973721cfbe08112001b80b7dc92615c2fd083f254ac29fa101104886229467667f6417b792678c45ff0973a9451b0249df7c74784ff58869e1cb839780518c7bc558ad25203c3085861cecc884d1e268e4315ed412566fee7a6899b4b8021f70969a13e090de4e79363652f62339ebc15180ec3d9cdf33bbd44aa47722765e317894a5e4416a0ba7d5e838ac0f27f7d223013338044af597f56ef944e0d3c8e9c67d07a23c748760e72b9a28b7cb235980299e3a88ab72774f36cb4640cc6fc32f0b6b3e6e5a6bac0492446b5caa9a0630603da8d6dd8064f0ac2c19e13c1a494ebb5bcb9db7e5ad54b37ade17929b3a5208ad1b0958773249f6e0b2b6a0f110e3b0261de13b42f8a184cf5ace37e55688caa54060af6ed5325e377c0df2e929881ad61627416d410f3bc26c056271bb300080e60e36e49926cf7e8665b84b292d8ac70bb15b8515c592f73016e3ee62b1296c6251a783e110b83a7a5207b07969b2ff1468b80bfa92d0917862de85d85177181c02d6dce1600e74f88bedf130c89a1ea0c221b0b8c43d125d4c0225c4db562a01623e8918081e8c006452894077b125d2fa668213fcb70bb86b60cd720ee0bc07805ae81067319abacc384a051833e962a416153db62528d522b416543dad3b24261f19b900f78309e9bf6f4b957cfab2c1d546b980255bf630392f1f260762b214a69959ad77f1d56e8758a9de7cd7541411a46807dc6c3afa83f5da730a559c899fe2c79dba8a1f86c5e71af9fef472f4d548933d1c4c1014118a129bb369d981ee30e12dffabb6b30f5dbb2b1daff0c5b2bf02cc4687977b05bea5285e0401d6d87f8c43e8cedd7f02927599e2e92a7a62d785a92c25f39067caad8198e839e6f8691d1aeb56c41cca44f53c792eba838f1cdbeae3a7ba138e37c0ad4d126ea64a9b927447d4a2aed87deb2d787b4a3d92b40f24f4d700e256bb6d81c68538295a54fc8c966bc3ca8ae1540c12d14cd5cec42e56ca27cdf4b809ab85f4617641d7d1e9886aac5b5b70f58ef8e3817c8e31c6ef9139939231e181824cc8a4fefdb76d3c18797a3cc9f912f59c3db9af269c0780753790a99091d0e8c36ca76fff9698f39ed312bd075a5724e5de48c3e6f53be759e215e6ba10cc278b37a7cb50753a494f59363d5c2e6ac8cdf77f0781679b8594a8cdc3494e49afb3c838b9594ce50909bd093e387c1692655e7be53d29c1211113339d0554591b304f2359d9d94819e3d09833f6899152c857af0f7b44496858dd575c368e857505cd6f3cf16828339b697a1d725ea7654b7448c3ba2b5051356b87eb869d3b2f0489eadcf1c173c4b75f7f391892d0252070eafdf03554f7cd2e1ece92405332cb242ed413b2a0342ccbb2a3bbf5e8c235a4a52397f29096269ac7e85d7145c0e522e4e3ab1749cf0e1d4a07e4bb22093372abaf658fcb69f32431d5ad976b21d6484539fa1ebc6eb21ff26ce1eaa6f91cbcdf5b8614d44f28c7a835712dae84d211026ed2f0ae3ceeecec0f96295c619475fa6990a72eba6eab4f66667b4d90d020a993be1ac1390d867e3c4aa1e8181c9b2c5ccb0da4fcd575f7f3b23e5689accaeaf5852fe16edb9b22ba52fc7f531a34b2182f227c75262fe0bc55709c2d06323130fdbc257767f4940a6b8439a092a5ce24efb06af48a12f0e5132103dfb35f762f9c39a7944a0448f6ee2912d501fdb4554fd9571cf0ed531f90d34051be18aac1f659526fe313e22b98d7459fbbf9eea263208e9b17d485c631e3b6860f48034b7e339504ddfb3d66c0cb6c6339506d22766f167eb3e52e2c5e9028b3dfc8bac4f9ca7c57f06ee7fc508eeb7744a7952b08be4d0328e9edf714eb862cfd7e231133580e5cb9c522f3b666bca778539d90a099e03f76727f1de127aba93a4974f8110de34733e8d8195f8960d9ce89dfd03fb5ab36709e300ede2b8abb84c3fb1be3640143cff822ff5e09633c67f58ec1eab1174b40f171ecdb2f13fa8ab1f0129d696bcbce6c6d3ceab0395a247549b2a88931ca1025b7ed58b533ed78db5f2771d4b974b18351396129c3692e2f44b3496d5ab8b77d915e5b4734531435579e3e87e33afd99114999223608b96d2826063fc1ab4d3a7028ba1e5c4b5d1b26d01a8b6419f491e1f824e95901fa581bcd66ce94da7055e6c4040bea70fd243d6ee3fa23ddde331e36cf2ec55924bab6ab0a5eb239760f3d8a4cb3c1b6ab738ba8ddb8f279ceeb9d99ecfdbdcbd192a1cb13c3fe24e771bd7074fc2791ca5d4748a7fa68fe5cc07a53d91320ef2bd5e8da77ec67d66b65be85a0caab472203c3c9feec245d56630b11e975249768542f8130b7b33a1b782d941cfc9e355d6a6451c298fdf6282cf118063780b860751b90b9cc13da671dc2c3b82841198ade18f7dd69c23f508e62028f40cd507895282a2526d18eeaa9871367b7b370340914c9e32acc3653da37f44aca9a4e87d65d76b0bb0d196ade4576ba355f3c4aeaae15d23ba7299fe144ebbce3cefef11b401690858fee3cf576f52928b90c517077b7f71e62dedec95cd4fd16d0fc6ea1797d483b1724cb2142af1a0f807371cf7cbd045cbe955d683ac65182437db08a25eed95c441a4e54b1cf8d9383cd13d4ee1ffeb8d8cc2024e88e3bd15f60f2377fcda7ce692cd37afcd8f401c6f0b7d6aae294e444683543621f049c41effeb73edc883bff4d47345a2ffd7fa212058b7552e93f046d0f3e7be40ad9a40698eb0b04fbb2c87468974ae23fb1d0caf1d57d3c9ead0357b34f27224d29020f935aae48ad78a032dd808d403e09fc521473b11b9e366aa1771da8d51ccae42b65b2db0f8afa761d27d5c703136eb5150077f8ead02c76db75c81b3026f38f73b184ad56af1405b75f57cead90e0d147ca5042b1fb49fa31618e2ed82efc91e72ba623b12551d71a5c7017a81c3179e521c63fb8052b6614bdec6adbd1401849e099f582ecd5f80bdfdd80e4e4bddd9088d76a307a3d7648ac305cd6b8d6a57e153fa254ee9383492216f8ec8a26425c952f9653c7db9c375fe1b1bbf7b96aebbb7e71b541572dca7762cdaec2d642ed537a600c857aa5ce38d4de471dbb4b83a4a7568926d753fbeeccaee0e0326b6e63d033a2ff54a12534e2fb24055090fc90eabfe52906737ebd71c4d7ece87034136714ad34c1d60695e89276b5529154a63404e1d341608619a4b1c5d1bb003195da14ad9888e09e4a28eddd4aa417159a2c18b2b6f3f6ede9388bd358680d1a51ca7c7ac061535635c16a5dee6e3159ecf28a77d8ccc8e4eae8a1869fe26cc5f0406016ebf1883af484646262b68ff1cb7f3cf0630244c0e2f3532511208c63348ebfc7ce840f97ed14c93dd8b3accebbd8fdfac5fa1bb33e2335760f61d306fe8ce7a963416252027eebf6035b22b0fe0eacde9edef067589290dbcb883cdcbb382b8601fffc8b22a2392f310653f36779693968d994f412faa45beaa1785f5892c75531ffa38420c74aeab24fa35d95e3adeb61687174a031bbff25dc5158d34bdd54d96d6eb8b22f80d9642ed86eeb42339cd9241f2d3af0089ff66764a6e01b96ee10e7be7fb48598bc9f75c1992c90ef005060fd5935851b1d9f1b6f18fb0758a75fca4bba3d106ad8fc6a77a075001319f3609430d6c3019857dab055dd9e0e18ae437e4ff283cdbe51741dd288cb4feb01520eb000cb9777c127db8079b46a1d1cd9edba890e337a1890a44de7d1d55edbd44b6effbbb26a2eb9fb772efe8af934b03b8d416d0b6472a1490ead224e1cfb4a6bbec22a2708278d4044773db6a209f4f3ae43c37e622be3d21d66a0cb086c0a0bcc68b3872ded1ea6ecdac1b9d366ef2231346fd15d32802f8d8f0ae7a5e8b548c59b29b3c511049c387d3c4765b70d9fc16651edb3b880b81cc744f11ebc0727e62b8fde43bfa70c2be94b5ec9178ee258020937264b31eb195e46a4bdb574d39d3c636678eefad425795043de650186324c3", 0x1000, 0x8}, {&(0x7f00000002c0)="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", 0xff, 0x1}], 0x4, &(0x7f0000001580)={[{@fmask={'fmask', 0x3d, 0x2}}, {@utf8='utf8'}, {@case_sensitive_yes='case_sensitive=yes'}, {@disable_sparse_no='disable_sparse=no'}, {@errors_continue='errors=continue'}], [{@uid_lt={'uid<', r2}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) r3 = dup2(r1, r0) getsockname$ax25(r3, &(0x7f0000000000)={{0x3, @bcast}, [@remote, @netrom, @null, @netrom, @bcast, @rose, @netrom, @netrom]}, &(0x7f0000000080)=0x48) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r3) 18:35:39 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2000000000, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$setown(r1, 0x8, r3) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r4, 0x40045542, &(0x7f0000000140)=0x9) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x400000, 0x0) 18:35:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x3c, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:39 executing program 3: 18:35:39 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xc0, 0x0) 18:35:39 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x3e, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:39 executing program 3: 18:35:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x3200000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 748.691464] ntfs: (device loop0): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 748.738816] ntfs: (device loop0): parse_options(): Unrecognized mount option uid<00000000000000000000. [ 748.805258] ntfs: (device loop0): parse_options(): Unrecognized mount option func. [ 748.841088] ntfs: (device loop0): parse_options(): Unrecognized mount option pcr. [ 748.855917] ntfs: (device loop0): parse_options(): Unrecognized mount option . 18:35:40 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2000800000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x4e00000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:40 executing program 3: 18:35:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x4a, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 749.059253] ntfs: (device loop0): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 749.234740] ntfs: (device loop0): parse_options(): Unrecognized mount option uid<00000000000000000000. [ 749.245393] ntfs: (device loop0): parse_options(): Unrecognized mount option func. [ 749.255142] ntfs: (device loop0): parse_options(): Unrecognized mount option pcr. [ 749.274465] ntfs: (device loop0): parse_options(): Unrecognized mount option . 18:35:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0x8c}], 0x1}}], 0x1, 0xfffffffffffffffc, 0x0) fsetxattr$security_selinux(r0, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:default_context_t:s0\x00', 0x27, 0x3) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_rose_SIOCDELRT(r2, 0x890c, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, @bcast, @bpq0='bpq0\x00', 0x6, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @bcast, @null, @null]}) 18:35:40 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x1002000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:40 executing program 3: 18:35:40 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x104, 0x0) 18:35:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xad73657200000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:40 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') tkill(r4, 0x401104000000016) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f00000015c0)={0x0, 0x2710}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:40 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000140)=0xc) ptrace$getsig(0x4202, r1, 0x20, &(0x7f0000000180)) syz_open_procfs(r1, &(0x7f0000000380)='net/icmp\x00') r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x200240, 0x0) getsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000240)=""/211, &(0x7f0000000340)=0xd3) write$vnet(r2, &(0x7f00000014c0)={0x1, {&(0x7f00000003c0)=""/227, 0xe3, &(0x7f00000004c0)=""/4096, 0x3, 0x4}}, 0x68) 18:35:40 executing program 3: [ 749.488214] net_ratelimit: 4 callbacks suppressed [ 749.488295] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x17, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x299) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000040)=0x1) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:40 executing program 3: 18:35:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xc80d51417ca0d93c, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f00000001c0)='net/rpc\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e21, 0x3, @empty, 0xffffffffffff0001}, {0xa, 0x4e24, 0x9b0b, @loopback, 0x7fffffff}, 0x100000000, [0x4, 0x42, 0x1f, 0x8, 0x283e, 0x0, 0x8, 0xfffffffffffff000]}, 0x5c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000000)) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:41 executing program 3: 18:35:41 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:41 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xba, 0x0) 18:35:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x49, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:41 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10000, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:41 executing program 3: 18:35:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000140)=""/181) 18:35:41 executing program 3: 18:35:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x1600000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:41 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r5 = dup(r2) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x181000, 0x0) splice(r4, &(0x7f0000000200), r2, &(0x7f0000000240), 0x570, 0x2) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000180)={r5, 0x1ff, 0x3f, r6}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)='lrw(serpent)\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r2, 0x4) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 18:35:41 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xa8, 0x0) 18:35:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x87ff, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:41 executing program 3: 18:35:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) epoll_create(0x6) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffd, 0x404400) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x2, {0x6, 0x100000000, 0x1ff, 0x0, 0x1, 0x101}, 0x0, 0x400}, 0xe) 18:35:41 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/context\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) r2 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f0000000140), &(0x7f0000000000)=0x60) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000280)=0x7, 0x4) 18:35:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xf5, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:41 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x14e, 0x0) 18:35:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) socket$packet(0x11, 0x2, 0x300) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f0000000040)={&(0x7f0000fff000/0x1000)=nil, 0x1, 0x3, 0x82, &(0x7f0000ffc000/0x4000)=nil, 0x8}) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:41 executing program 3: 18:35:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x100000000, 0x100) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000002}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="000329bd7000fbdbe2401af98b08ebdf7d16c82dc651e626e50400020008000100af6cb3e4200000000400028f0800015fca96d9009fb5f9ade20e531d6af45d3152d64a6aa9851ed094ea05cc0b2c6923df8196a9f4a8de1a3717dffe83cbf12bcea8c6de594fc6176444024d0af958434d6b3ecd635f867725d968d7b16ad52dd862301cbfeb6337"], 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000380)={0x0, @bt={0xfff, 0x100000000, 0x1, 0x2, 0x4, 0x3ff, 0xed, 0x3, 0x20, 0x5, 0x1800000000, 0x10001, 0x200, 0x3, 0x2, 0x20}}) sysfs$3(0x3) 18:35:42 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) fchdir(r0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) [ 750.900384] protocol 88fb is buggy, dev hsr_slave_0 [ 750.907131] protocol 88fb is buggy, dev hsr_slave_1 [ 750.913372] protocol 88fb is buggy, dev hsr_slave_0 [ 750.918568] protocol 88fb is buggy, dev hsr_slave_1 [ 750.925256] protocol 88fb is buggy, dev hsr_slave_0 [ 750.931267] protocol 88fb is buggy, dev hsr_slave_1 18:35:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xffbdffffffa80000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:42 executing program 3: 18:35:42 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x166, 0x0) 18:35:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x108) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='yam0\x00', 0x7, 0x6, 0xfffffffffffffc01}) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1, 0x0, 0xfffffffffffffd75}}], 0x1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000340)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b2537e9517341799282132ab35d100", 0xf}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000017010000030000000000000000000000180000000000000017010000030000000100000000000000180000000000000017010000030000000000000000000000180000000000000017010000010400000000000000000000b0000000000000001701000002000000980000007a2af03462d1f7f64360b63965df1cef37e49254211577ce9c4faf4c2bd39056b96e2eea2cfb351731b4ddf6c92e2ef01efb126c1aa17df0bf3b61af7cdcd2841231b300e545f818b2c4a165a9e9df66b0759f3a6ea885395af20830028035d2503f21dabdf1ea0fa324facced22c53898b7e3db0e950f6178f8655f159e100c6c5f33f8614261faea6dfb89b83de2000000001800000000000000170100000300000001000000000000000000000000000000000000000073cdd0b433a01752d79d389cd1cfe0fbfed45ff3be257ec2bcc4c5cc9a978060a89f9e9661249b41e9f56a0ef47ce6fa6d816cc4c79d2512b127ceff3fc40a582530802fd205ff1176f6d40a7e9b93f89413707c4c72fe2ff0c7e2ce2a1efb376ead16d45b42a8293f5d9acc6ee9a8523dd1b25d0915c511e523d18c94a9faabee6345b7f232bca3d459a6bd83fc"], 0x128, 0x40000}], 0x1, 0x20040000) 18:35:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000200)=""/181) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt(r2, 0x2, 0x0, &(0x7f00000001c0)=""/9, &(0x7f00000002c0)=0x9) wait4(r1, &(0x7f0000000080), 0x2, &(0x7f00000000c0)) 18:35:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x22, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:42 executing program 3: 18:35:42 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000b72000/0x4000)=nil, 0x4000, 0x4, 0x33, r1, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x20) times(&(0x7f0000000000)) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:42 executing program 3: 18:35:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xaf40aa41a0000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xfff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x100}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={r2}, &(0x7f0000000200)=0x8) r3 = accept$alg(r0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8004004) ioctl$sock_bt_hidp_HIDPCONNDEL(r4, 0x400448c9, &(0x7f0000000040)={{0x8000, 0x5, 0x529, 0x80000001, 0x777, 0x6}, 0xfffffffffffffff9}) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@iv={0x30, 0x117, 0x2, 0x1a, "0910f08ab04eb74dfd02c1ad680cc886ed526c7101000ef0c11a"}], 0x30}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x1000002000000000, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x800000000000002, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000001c0)={'ip6tnl0\x00', 0x9}) splice(r0, &(0x7f0000000040), r0, &(0x7f0000000140), 0x94, 0x7) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:42 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:42 executing program 3: 18:35:42 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x17f, 0x0) 18:35:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xffffffffffffffa7, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f00000001c0)={0x100000000, 0x2, 0x10000, 0x5, 0x8, 0xfb6}) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000280), 0x0) getsockname$inet(r2, &(0x7f0000000080)={0x2, 0x0, @multicast1}, &(0x7f00000000c0)=0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) syncfs(r0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:42 executing program 3: 18:35:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x1200000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:43 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfe00, 0x100) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000140)={0x2, 0xfffffd72, "f84a6a87dcd26eda43d37c6856c2f5ff20662a0e47abccf7a259594c231304a7fbe01319e3b150816552c54df6608c265646acceb1ba14fd2759ad7c83e34d437906ce0ecbfaf9b0611ab942b6dff96ea1b6daa850a805ec2e0a139b9e0af42d4da8f6f1c1544befd68465d3"}) 18:35:43 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1d0, 0x0) 18:35:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000200)=""/181) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffff9b5, 0x44100) 18:35:43 executing program 3: 18:35:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = getpid() move_pages(r2, 0x2, &(0x7f0000000000)=[&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil], &(0x7f0000000040)=[0xffff, 0x4, 0x2, 0x9], &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x2) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:43 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000240)) recvfrom$rose(r2, &(0x7f0000000340)=""/138, 0x8a, 0x2001, &(0x7f0000000400)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @default}, 0x1c) getpeername(r1, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000000)=0x80) setsockopt$inet6_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000200)={0x81}, 0x4) 18:35:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x58000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0xa000, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={&(0x7f0000000140)=""/236, 0x22000, 0x1000}, 0x18) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:43 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x191, 0x0) 18:35:43 executing program 3: 18:35:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x78, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:43 executing program 3: 18:35:43 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, &(0x7f0000000000), r1, &(0x7f0000000140), 0x1, 0xfffffffffffffffe) r2 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x4, 0x109400) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000340)=""/168) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000200)={0x0, 0x0, 0x2, 0x0, [], [{0x400, 0x1, 0x1, 0x2, 0x20, 0x100000000}, {0xf2, 0x7, 0xce12, 0xfd9, 0x7, 0x7}], [[], []]}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x4600, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:43 executing program 3: 18:35:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x1000, 0xa000) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000300)=""/60) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x10001, 0x80082) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)=0x8) openat(r2, &(0x7f0000000280)='./file0\x00', 0x200, 0x41) write$binfmt_script(r2, &(0x7f0000000180)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '/dev/input/event#\x00'}, {0x20, 'em0\xb6'}], 0xa, "1bbfd0982e0a8fb170a94032af6b42537a4cdc47482cd1da22081234b3e1140d1fc35cdcb8f9d6d316ed390196143379c0cd149171a124352a4a3a9f27f0916b60fcc2ec92f7904db8846b689e0d6fb04172d62cb9a64e546dc701cbb0005025866dd2997a966b59b3f2dc50b16e955842223a0c973335b80fdbef98999beb596c753c1e14864ad6136fd1efaae9c03214b7d38b176d97b07774c5d46c6764812a1dc85f0c83db7d1b4f769d442085f28147517681c731bdad18aac4e59a"}, 0xe3) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={r3, 0xa8f}, &(0x7f0000000140)=0x8) 18:35:43 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) r3 = accept(r1, &(0x7f0000000140)=@rc, &(0x7f0000000000)=0x80) accept$inet6(r3, 0x0, &(0x7f0000000200)) 18:35:43 executing program 3: 18:35:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x5c00, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:43 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x199, 0x0) 18:35:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='gid_map\x00') getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:44 executing program 3: 18:35:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xdf2bc15200000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000240)=0x8) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept4$inet6(0xffffffffffffff9c, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c, 0x800) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000001c0), 0x4) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:44 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, r0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x6, 0x501980) sendmsg$inet_sctp(r1, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x4e20, 0x80, @empty, 0x5}, 0x1c, &(0x7f0000000640)=[{&(0x7f0000000240)="5164ac894f21c8bbcc1cf938230a8dce2c52b82c39a0ad9c3019d5391057115b9bd94d6ec778f6a8e23437acf89bac016a10bafa1cdbf94fe19307f1d0373bdab9da434a8411c597b0cc9161b8e868dfe12b9a075465522acc652ad24d36f822e2703402e5af2f1373586acf147f49db6812", 0x72}, {&(0x7f00000002c0)="beb8912981f2194a960acc39065aca1e62b08e4c48f0db0205261ee5890a726781268e85cf92f78f1f3ff3e7640b2c8d181396a5dd881c15b3ab9c322460ad72", 0x40}, {&(0x7f0000000300)="240267e8cb9dbff68790661ff76485a533ab5dd3c9048f9cfa78142c2731fde4d86d6f55437f519a58a0c77d1ecf057dfc3a3dbfff3b06325fb5041120831b11ad4bc2666cea081f8e8447e42739f294a939", 0x52}, {&(0x7f0000000380)="ae56cc3a9461ea7f3b52e086", 0xc}, {&(0x7f00000003c0)="efdaf3b38c481189c468aa3c4da1c2166cbfc354ae15252ab610a5c883053d4ae1ab7dc00e89d416d7d5d5d023f78040f2664b6e547aa858dbf6b3e9cddb16cc00dfd9fa4b42275cf4e75ce37785e9963aec4467d324e20b2e9e557e68e1206c9ac57f9901ef7feb48bb5523ebdc74ce69fb05a0247c2895d7b696e5465b24e0749ba1127752ff46917c087065983f63e739080026fc1cdeb8a586aa471d524df1821a101d5d41290d7e1fefd03f51de85", 0xb1}, {&(0x7f0000000480)="e908d8b896782bb763e0c40797af9eaab8f750d4ee7ecfde79424178cfaab7de85dd1ff49d3f117e4d84f5c7b5d343b5d7ee2ad553ed375d0991a99e8010b72f8d87c0fc93", 0x45}, {&(0x7f0000000500)="c50f5cb2539348cf4909aaf654d9a24489afd54543020e9dc5101e07ed2348001def2f2589b97c66bf3b8aa8368046479214f23a009a4585dfd2b2", 0x3b}, {&(0x7f0000000540)="9acaab04c63f200fd99dd30004f879a4b18006c6143ad68ead064d046f61fda2838cfc4cbff9ed4b48df402093aa83244638b2a08d180746c6e9aabbea9cc7420a36b6f2cd4405a5d6be7b68c6aca79c4e47b2d8bddcc9dc7a833e125a53ace3a6d4d5906a8d", 0x66}, {&(0x7f00000005c0)="eb705afe018de7b8f903b2ec66cc3b5e8323360c82e7c5104970c3589b7490ddf74b44d3f71a460678ff54bbc60dbecd8434c26ab756150c55ae0b3ad0970f9e9e43900aac0cb0d6b75cd5a00b7b606f76da389c9d7268405b6070", 0x5b}], 0x9, 0x0, 0x0, 0x40}, 0x240080c4) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getpeername$tipc(r2, &(0x7f0000000140)=@id, &(0x7f0000000180)=0x10) 18:35:44 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1b4, 0x0) 18:35:44 executing program 3: 18:35:44 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r2 = dup(r0) ioctl$CAPI_GET_SERIAL(r2, 0xc0044308, &(0x7f0000000000)=0x3ff) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x3e, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 753.112246] Unknown ioctl 8817 [ 753.169100] Unknown ioctl 8817 18:35:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x2c00000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:44 executing program 3: 18:35:44 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x138) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000200)={{0x87, @loopback, 0x4e21, 0x2, 'lblc\x00', 0x24, 0x1000, 0x21}, {@remote, 0x4e22, 0x2004, 0xfffffffffffffff8, 0x5, 0x1}}, 0x44) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000620000/0x4000)=nil, 0x4000, 0x2, 0x32, r0, 0xfffffffffffffffc) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000180)={0x20, 0x8, 0x200}) r3 = fcntl$dupfd(r1, 0x0, r1) write$P9_RLOCK(r3, &(0x7f0000000000)={0x8, 0x35, 0x1, 0x3}, 0x8) ioctl$EVIOCGKEYCODE(r1, 0x40084503, &(0x7f0000000080)=""/181) 18:35:44 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200), &(0x7f0000000240)=0xb) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bcs\x02\x00', 0x1000}) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000040)=[@iv={0x88, 0x117, 0x2, 0x6e, "04c2b247745b4686235aebe08e82b65e8ea71f9236dfc03a65dd082242dd9fdf3360017952df09b25b058d7cb5964cf59a813fcbcb9b30a0e4677315db08600be5400315f755c7313ee3088761af9b9a7ee38da2fa6c7708481407c300549f7715ec1edca690a273ebe4a6af4d51"}], 0x88}], 0x1, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x80) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1000000000000392}, 0x2}], 0x1, 0x0, 0x0) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) write$P9_RREMOVE(r1, &(0x7f00000001c0)={0x7, 0x7b, 0x2}, 0x7) 18:35:44 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) getpeername$unix(r1, &(0x7f0000000140), &(0x7f0000000000)=0x6e) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:44 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1ef, 0x0) 18:35:44 executing program 3: 18:35:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x3c000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:44 executing program 3: 18:35:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x20000, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:44 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xf7, 0x0) 18:35:44 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:44 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x20200007fffc, 0x4) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="19fb450404a9090000000000000086fa030000000000000096ab2a7bd6558ee73a98312550f83036bdf371d4c37c7222445d632b7c5c59000000000000a445c3ca4799a099"], 0x45, 0x2) r1 = syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0xb9e, 0x800) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000200)=""/74) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r2, 0x89e6, &(0x7f00000002c0)={0x7, 0x4}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001ac0)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000001bc0)=0xe8) syz_mount_image$iso9660(&(0x7f0000000340)='iso9660\x00', &(0x7f0000000380)='./file0\x00', 0x1, 0x9, &(0x7f00000019c0)=[{&(0x7f00000003c0)="47fcf8de259100fe0cdc320f573188b5deda325b02577a0901658c801f9a60fcaa0a8d5fd0c115f0cdeb1994c3e09f496e2cdbc7d4f34dc49163f1d0351b8fc6843705d0e752713739a3dac2aaa450883a5d4dde42f7c409e4621bb5b24f098ddc52a0cdc36a3b9dc4721b1ffb66e50b08d9bd0f0b00b22f3c761af83b02828463", 0x81, 0xffffffffffffff81}, {&(0x7f0000000480)="8f8253ae53901a50c207ebfecf4fa38aa593d7aa3c6df756e3576f8d467cd11134247e2b39d35bf502d3598f4ff4c3dd140e5eff011021516cb3cfc764ccab98201b15c24f06cb8bea515b3a18468da3f88458689014cf8fc283cd4472c491b8b2ee9aecb8123fb05a09add8ffabd5c8a8feed1fb287a877a2", 0x79, 0x6e}, {&(0x7f0000000500)="2cdbc3dbcd181aa8ca4ebca1e4a3f775c57fc3bea5f88c1b29fcf4e748939bd484c7ffdf102c6882ee48403ca24b8c38e634dc86572801ac65b5e43ec26564440fc63d77b185d9f41c81d3e60be8b1f7b49f84e6c0cf3acbb119cea9f426b61421115a20376f757ce7fcc83336ffef3c5d0f019d5fea58c15a01382ac1686190e740b31134272de60cb25db5617eb328b478fe4bc0510db678c0c24bc2c5ce0313022625dfe51f1379d390ebc195db7bbd1fc49c83f67b3fc755ff2b2c0b39df32a863e264e1a4cd5cc02e9a14cfb5", 0xcf, 0x5}, {&(0x7f0000000600)="71cf5c17403cae94ec65ead3bfa2bdcc502068b92aa8dbf1ea33fd1cb5b982be8e8b3499e109b6bc6fcea2e547bfef66aa974d778459d863c2b0eb662217b75afa51ab469a254a096d2c3c327082536862a4d43cedb6a5d1e33ed26e1ae5fb29eed1be151633722166ea78d1ca25fbf616f6d5fd1d52766ed19e64900e3a6f8faa6af51a8eb0181b3fe37f697e5e181cd29246ba1a3336754550741dbc65ae973f3691d7c9b44ccbc3cfdba67e2e7827be4b0e1f929b1b929d7c20aec4eb16050e7f5743eb0190242958783cb35b989f93047a81a424667778", 0xd9, 0xffffffffffff7ed7}, {&(0x7f0000000700)="0207e1914260c8289e5a93017bf2f791764524463c62b60cf6799ec3db55bc93c513a45208aa99e53a75d9e05dce2b67e3c65427c40f2640b7f8a023bfadaf36fcba0f15695e37ef11ae8592e81b838da4e7cbcacecea3f669105b1a7a5fb1432ff2f87ed7733a6deda2a1ab568cc48c28c8428dc595cc473f1115eb30e947017f6f57bf7d2a8a80599655329ca9bec0ebfb1b20540a2a", 0x97, 0x6}, {&(0x7f00000007c0)="aae699e9e93efd7a276cdc528a3775b8b2bb73531091056343272356a437fb8f3aa263c7d149ca1874fdcc9116192e7fd2146bffd903a904b82dd5577ad32401f35d540180d6ac435e257570f0f92b012b2af7ea421bddf8fc22732ad36a441e482b994a1d8b992f67c216e83a289085174ace02f61dee5162668888b2555c7c2a2153dea7b52e7c16c8411da685cf8db272f543c7cc0681a9e5a68b828f591d907729a995573bc7354b", 0xaa, 0x5}, {&(0x7f0000000880)="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", 0x1000, 0xfffffffffffffffe}, {&(0x7f0000001880)="027d334f35d309ed2378b3edf10611141666236a09700c92a8d85f811f4a77259f3be1b6597829aa2ef0d6fbf7007d7e30e2ac5e5fb0d8e7f2c5f60ab4406a61965499b70b37510ecbc0908d3b897b2e3df8753aee6b491df16f1ae909f611c1d3e2fe1b06742d7f8e05526fcaf59db4c4a3a88112e70d9f0fcf85b6cafc2023dc198d11f16cebabb2c53bcc2943acdb6ca5fcbe9b42d370bdd0f8bcf7668d03c3ac6d32c77d214860de007808618025ca0ea5dd9864d4a81ae6e581b06162", 0xbf, 0xfff}, {&(0x7f0000001940)="f1a5d696e25c6a2e1cb48e7b6863858a566c08f9a7cac884343900c639fc99b5232e0b20aed8bd3f29ebc7edf8fc4f98d5c61b58f1667d2fa4a7765f1991b7e76b69adcd", 0x44, 0xff}], 0x800000, &(0x7f0000001c00)={[{@overriderock='overriderockperm'}], [{@smackfsroot={'smackfsroot', 0x3d, 'trusted.overlay.upper\x00'}}, {@obj_role={'obj_role', 0x3d, '/dev/dmmidi#\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@measure='measure'}, {@subj_user={'subj_user', 0x3d, '/dev/input/event#\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x33, 0x76, 0x37, 0x39, 0x34, 0x0, 0x32], 0x2d, [0x63, 0x67, 0x63, 0x7b], 0x2d, [0x39, 0x7b, 0x77, 0x65], 0x2d, [0x0, 0x77, 0x37, 0x3b], 0x2d, [0x38, 0x3d, 0x9725eb9ceb654c5b, 0x7f, 0x77, 0x63, 0x33, 0x77]}}}, {@fowner_eq={'fowner', 0x3d, r3}}]}) ioctl$EVIOCGKEYCODE(r1, 0x40084503, &(0x7f0000001f40)=""/181) 18:35:44 executing program 3: 18:35:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xe0824a1000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0xfd44) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x1, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0x3) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000040)={0x1904aacc06817e7b, 0x0, &(0x7f0000ffb000/0x3000)=nil}) 18:35:45 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfb65, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x40084503, &(0x7f0000000080)=""/181) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000180)=""/130) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000240)='veth0\x00') 18:35:45 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1bf, 0x0) 18:35:45 executing program 3: 18:35:45 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000180), &(0x7f0000000200)=0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) 18:35:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x1800000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:45 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x1) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x80) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180), 0x0, 0x8000}], 0x1ed, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:45 executing program 3: 18:35:45 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x28000, 0x0) setsockopt$llc_int(r1, 0x10c, 0xf, &(0x7f0000000140), 0x4) mmap(&(0x7f00001de000/0x2000)=nil, 0x2000, 0x2, 0x4815, 0xffffffffffffffff, 0x1) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:45 executing program 5: 18:35:45 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xa6, 0x0) 18:35:45 executing program 3: 18:35:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x84) r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0xa72, 0x212000) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f00000001c0)="66b91f0300000f322e2e0f0053cbf7ebb846048ee00fc71966b9800000c00f326635004000000f300f01cb440f20c0663507000000440f22c00fc71c66b9580200000f32", 0x44}], 0x1, 0x2, &(0x7f0000000280), 0x0) r3 = accept$alg(r0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000640)=0x1f) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0xee, 0x12c, @buffer={0x0, 0x41, &(0x7f0000000280)=""/65}, &(0x7f0000000300)="7397e90176c884c2973dac9006e018f3a02582440c3e9cd1711bd7df76825f59fc51330d9551f02bf163875ca0e7a06fb817e887360e2707fa1c5ce86cf7fdf4cb523fd5ce6fbdfd2c70c6e2a54bb4f3c80a57bc191f6bf544c010f1790ed5ba54ca6b88090a856ed4dbab623ab93618c0b6ec7b5730520ce255df7339a79c41d79de56ef8c4199044e7d1ad005a11d1c013472a77fc5c8b773d3dacea96438963e28379219acbc2c45f7f48b71bbf707a59232e617cc06a060b4ccecc546260e4eee2e8383237a9b378bcd1f5d7c9c45d6cb7d82c201534c123aeaa7907275c01cf9b67055c49d8566fa97c2106", &(0x7f0000000540)=""/232, 0x4, 0x22, 0x1, &(0x7f0000000400)}) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101000, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x4, &(0x7f0000000000), 0x4, r4, 0x4}) recvmmsg(r3, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x9003000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:45 executing program 3: 18:35:45 executing program 5: 18:35:45 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x7e, 0x0) 18:35:45 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000004c0)='/dev/input/event#\x00', 0x2000000000, 0x200000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = syz_open_dev$admmidi(&(0x7f0000000440)='/dev/admmidi#\x00', 0x9, 0x14000) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000040)) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000480)={0x18, 0x1, 0x0, {0x200}}, 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x758e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000140)={0x80, 0xfffffffffffffffd, 0x101, 0xe98c, 0x1, 0x20000001}) sendto$netrom(r2, &(0x7f0000000280)="439acd5efcf2119697aea5887b37c96f190b64da77fbd4fcfdbec1b634aaff7cecafcfe3ab488ceb513a3204205403227c593c280e674b9e49d45351a6fb228cf32e49ab78e784f24817b257f9083cc8d2d926803de565cba1e369647984e939e53b5f7c5ebf8ab660f8eaeef7f441eba5eab7b23e8060ec0b65e7b24ccd97899db128e2ba82ee11e32fedce7132e57e1809a467d58eefbadcf97e8d65faea7b99658ed5de8d5fbb0fbad530ccbc6b75ee3b52ea6b25225bbf6ca697704291dcf2efd8d599e2fd169513487574d7ecddc628db6e46ef0aa5bd29d8", 0xdb, 0x8840, &(0x7f0000000380)={{0x3, @null, 0x1}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f0000000240)={0x2, 0x4}) rmdir(&(0x7f00000001c0)='./file0\x00') r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r3, 0x2) r4 = socket$inet6(0xa, 0x1000000006, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = dup2(r4, r3) pread64(r4, &(0x7f0000000400), 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)=0x0) fcntl$setown(r2, 0x8, r6) syz_mount_image$reiserfs(&(0x7f0000000500)='reiserfs\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000580)="d86cb636306092edcfe51b036240f17caef97d67db7b950a4bfc00faae4b90c8c08a2b9703f31c643c89cf9c262e8b3939f96e5f28341b83ead3e37733f117e88f8e531ae94cd511d2f7887744fc65dacbb8963e6310df75525391738a3700e7b1a72c3c0a23542a816e21eb43645aeda060979b33fa0b204b1d7dec9ebba9e47838a20b768f088d8a0404ea901a1b5c2140a32aef23647e0476d470581ebb6bc973522a1a88fce9a7f7570241775fa155148113d9833faf", 0xb8, 0x7}], 0x400, &(0x7f0000000680)=ANY=[@ANYBLOB="7461696c733d6f66662c626c6f636b2d616c6c6f6361746f723d6e6f5f756e6861736865645f72656c6f636174696f6e2c626c6f636b2d616c6c6f6361746f723d6e6f74657374342c626c6f636b2d616c6c6f6361746f7278706f73655f70726976726f6f742c626c6f636b2d613d6e6f74657374342c6d6561737572652c7375626a5f726f6c653d2f6465762f61646d6d69646923012c646f6e745f686173682c00000000000000000000000000000000000000"]) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r5, 0x40045532, &(0x7f0000000400)=0x2) preadv(r3, &(0x7f0000001840)=[{&(0x7f0000000740)=""/170, 0xaa}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/51, 0x33}], 0x3, 0x0) 18:35:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0xffffff36) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'ccm_base(lrw-serpent-avx2,sha3-512)\x00'}, 0x58) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x208100, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', r2}) r3 = getpid() getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) ptrace$cont(0x9, r3, 0x3, 0x5) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000180)) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) r4 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r4, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:45 executing program 3: 18:35:45 executing program 5: [ 754.724488] kauditd_printk_skb: 1 callbacks suppressed [ 754.724504] audit: type=1400 audit(1546194945.857:70): avc: denied { name_connect } for pid=26091 comm="syz-executor2" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 18:35:46 executing program 3: [ 754.848723] REISERFS warning (device loop2): super-6505 reiserfs_getopt: head of option "block-allocator" is only correct [ 754.848723] 18:35:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x6925711bc1520000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x101000) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000040)=0x4) accept$netrom(r1, &(0x7f0000000080)={{0x3, @rose}, [@null, @default, @null, @rose, @remote, @default, @null, @null]}, &(0x7f0000000180)=0x48) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:46 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xfb, 0x0) 18:35:46 executing program 5: 18:35:46 executing program 3: 18:35:46 executing program 5: [ 755.140719] REISERFS warning (device loop2): reiserfs_fill_super: Cannot allocate commit workqueue 18:35:46 executing program 3: r0 = socket$inet6(0xa, 0x500000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='sit0\x00\x00\x02\x00', 0x10) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=ANY=[@ANYBLOB="000a040500000000ff01000000000000000000000000000100000000000000000000000000000001ff120000000000000000000000000001fe80000000000000000000000000000000000000000000000000ffffe000000192081b2e057eb6421c49d8780956f2c5093ddf97fc912fd2ce86ce935ffebd159a6a16561477d7d1f4863a"], 0x1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x27ffe) sendfile(r1, r2, &(0x7f0000000040), 0x8080400001) 18:35:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xfbed5f47d7ec1548, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:46 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x18c, 0x0) 18:35:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x1012}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x306) ioctl$sock_ifreq(r1, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) 18:35:46 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2141) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000140)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 18:35:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="59f0c70c1ca78de977d9acdba296c3b5a7f62091a509539111114817f4e6eaaf468c845623e729c3a5af4ff50ce8ec0c8a81414065109a38a4074475f34addc523e6876f", 0x44, 0xfffffffffffffffc) openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r2, r3) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r4, 0x10f, 0x82, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 18:35:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x1a, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:46 executing program 3: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0xffffffffffffff05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 18:35:46 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xd5, 0x0) 18:35:46 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000, &(0x7f0000000140), &(0x7f00000001c0)=[0x0]}}], 0x0, 0x0, &(0x7f0000000300)}) 18:35:46 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rfkill\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:35:46 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xc, 0x40011, r0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f0000000140)=0x1) 18:35:46 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x155, 0x0) [ 755.955384] audit: type=1400 audit(1546194947.087:71): avc: denied { set_context_mgr } for pid=26194 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 755.987085] binder: 26194:26209 got transaction with invalid offsets ptr [ 756.031794] binder: 26194:26209 transaction failed 29201/-14, size 0-12288 line 3062 [ 756.063663] audit: type=1400 audit(1546194947.117:72): avc: denied { call } for pid=26194 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 18:35:47 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rfkill\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:35:47 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000140)={0xa, 0x3ff, [{0x80}, {0x2, 0x0, 0x4}, {0x3ff, 0x0, 0x2}, {0x5, 0x0, 0x100000000}, {0x8, 0x0, 0x71de453a}, {0x8, 0x0, 0x40000000}, {0x713, 0x0, 0x8}, {0x4, 0x0, 0x6}, {0x7, 0x0, 0x1}, {0x101}]}) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, r1, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000200)={{0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x2, 'lblc\x00', 0x2, 0x1f, 0x3b}, {@broadcast, 0x4e20, 0x7, 0xf30f, 0x533, 0xb5c}}, 0x44) ioctl$EVIOCGKEYCODE(r1, 0x40084503, &(0x7f0000000080)=""/181) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) 18:35:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x726573758d9a8c8a, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:47 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1fa, 0x0) 18:35:47 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') tkill(r4, 0x401104000000016) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f00000015c0)={0x0, 0x2710}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) [ 756.316897] binder: undelivered TRANSACTION_ERROR: 29201 18:35:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x18, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:47 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x1000, &(0x7f0000000280)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@version_u='version=9p2000.u'}, {@access_any='access=any'}, {@posixacl='posixacl'}, {@mmap='mmap'}, {@nodevmap='nodevmap'}, {@access_uid={'access', 0x3d, r1}}, {@noextend='noextend'}, {@mmap='mmap'}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/input/event#\x00'}}, {@audit='audit'}]}}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r2 = socket(0x5, 0x80000, 0x5) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000340)={0x0, 0x5}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000003c0)={r3, @in={{0x2, 0x4e23, @multicast1}}}, 0x84) 18:35:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x2800, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 756.505162] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:47 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x158, 0x0) 18:35:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x18, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x6700, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x18, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:48 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x200080, 0x0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 18:35:48 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') tkill(r4, 0x401104000000016) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f00000015c0)={0x0, 0x2710}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:48 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xda, 0x0) 18:35:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x5d00000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) keyctl$dh_compute(0x18, &(0x7f0000000080)={r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) [ 757.176311] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:48 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x18d7, 0x20000000000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x74, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0xff, @dev={0xfe, 0x80, [], 0xd}, 0x3}, @in={0x2, 0x4e20, @rand_addr=0x4}, @in6={0xa, 0x4e20, 0x7ac, @mcast2, 0x7}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e24, 0xfffffffffffff801, @mcast1, 0x2}]}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000002c0)={0x1, 0x1e8e, 0x20d, 0x4, 0x3, 0x8, 0x0, 0x8, r3}, 0x20) getsockopt$inet6_int(r2, 0x29, 0x59, &(0x7f0000000300), &(0x7f0000000340)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@multicast2, @in=@local}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000500)=0x0) ptrace$getenv(0x4201, r4, 0x5, &(0x7f0000000580)) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xf74, 0x80440) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f00000005c0)=""/173) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r5, 0x28, 0x6, &(0x7f0000000140)={0x77359400}, 0x10) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) 18:35:48 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x10d, 0x0) 18:35:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x6800000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x18, &(0x7f0000000080)={r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:48 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000240)=""/181) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0xffffffffffffff01, 0x3ff, 0x435, 0xfffffffffffffff8, 0x4}) 18:35:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x5900, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:48 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r1 = syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') tkill(r4, 0x401104000000016) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f00000015c0)={0x0, 0x2710}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 18:35:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xb073657203ffffff, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:49 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x200) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000240)={'filter\x00', 0x0, 0x3, 0xa4, [], 0x1, &(0x7f0000000140)=[{}], &(0x7f0000000180)=""/164}, &(0x7f0000000300)=0x78) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x40084503, &(0x7f0000000080)=""/181) 18:35:49 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x9, 0x0) 18:35:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 757.991909] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xffffffffe3cae6ea, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:49 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1b7, 0x0) 18:35:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x73d70b589660c002, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:49 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') tkill(r3, 0x401104000000016) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000015c0)={0x0, 0x2710}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) 18:35:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:49 executing program 2: syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x48000, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x4, 0x2}, &(0x7f0000000140)=0x18) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=r1, @ANYBLOB="0300090001000000000000001700f50de30009007f00030000000000a1c3caac5643010100"], 0x1a) r2 = syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0xfffffffffffffff7, 0x102) ioctl$EVIOCGKEYCODE(r2, 0x40084503, &(0x7f0000000240)=""/181) 18:35:49 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x70, 0x0) 18:35:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x1d000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:49 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x184, 0x0) [ 758.622724] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x42000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:49 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000440)=""/181) 18:35:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x210000002c0000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:50 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') tkill(r3, 0x401104000000016) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000015c0)={0x0, 0x2710}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 18:35:50 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x355000, 0xa0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000080)=0x3) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x40084503, &(0x7f0000000200)=""/181) socket$inet_udplite(0x2, 0x2, 0x88) 18:35:50 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xdc, 0x0) 18:35:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:50 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x150807db4fbc0b7f, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 759.171727] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x50b5bbe455be5fff, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:50 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:50 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000140)=""/109) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:50 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x5c, 0x0) 18:35:50 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:50 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:50 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') tkill(r3, 0x401104000000016) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000015c0)={0x0, 0x2710}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 18:35:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x2e, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:50 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x89, 0x0) 18:35:50 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:50 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:50 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x9, 0x110, r0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x440d, 0x0) linkat(r1, &(0x7f0000000140)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x1400) [ 759.723840] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xe69b01, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:51 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xa4, 0x0) 18:35:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) [ 759.843384] audit: type=1400 audit(1546194950.977:73): avc: denied { map } for pid=26472 comm="syz-executor2" path="/dev/input/event2" dev="devtmpfs" ino=17440 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=chr_file permissive=1 18:35:51 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x101000, 0x0) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f0000000140)) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) 18:35:51 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:51 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') tkill(r3, 0x401104000000016) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000015c0)={0x0, 0x2710}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 18:35:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x67000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:51 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 760.346049] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:51 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1e, 0x0) 18:35:51 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000001000, 0x21103) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x2, 0x20180) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000500)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x800, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0xdd}}, {@version_u='version=9p2000.u'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/input/event#\x00'}}, {@audit='audit'}, {@context={'context', 0x3d, 'system_u'}}]}}) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000000080)=""/181) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = getpgrp(0x0) fcntl$setown(0xffffffffffffff9c, 0x8, r3) r4 = geteuid() setreuid(r2, r4) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000509000/0x4000)=nil, 0x4000}, &(0x7f00000004c0)=0x10) sendfile(0xffffffffffffffff, r0, &(0x7f0000000280), 0x2) 18:35:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:51 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:51 executing program 2: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') tkill(r3, 0x401104000000016) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000015c0)={0x0, 0x2710}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 18:35:51 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x10b, 0x0) 18:35:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x8e2d30, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:51 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') tkill(r3, 0x401104000000016) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000015c0)={0x0, 0x2710}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 18:35:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 760.864119] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) [ 760.993417] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xa7ffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:52 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x5f, 0x0) 18:35:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:52 executing program 2: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') tkill(r3, 0x401104000000016) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000015c0)={0x0, 0x2710}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 18:35:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x2b9bc7e499d77d65, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:52 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') tkill(r3, 0x401104000000016) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000015c0)={0x0, 0x2710}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 18:35:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:52 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x3b, 0x0) 18:35:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x1100000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 761.663094] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:52 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x143, 0x0) 18:35:53 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') tkill(r2, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 18:35:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xe65b45be5b4b02, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:53 executing program 2: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') tkill(r3, 0x401104000000016) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000015c0)={0x0, 0x2710}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 18:35:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 762.101635] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x874d3e017d5dc56b, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:53 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x138, 0x0) 18:35:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) [ 762.350799] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x2b000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:53 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 18:35:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:53 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xcd, 0x0) 18:35:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0xe6, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(rfc3686(ecb(cast5)),digest_null-generic)\x00'}, 0x58) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000200)={'filter\x00', 0x2, [{}, {}]}, 0x48) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000004500)=[{{0x0, 0xa22e142d818ece6, &(0x7f0000000180)=[{&(0x7f0000000000)=""/229, 0xe5}], 0x1}}], 0x40000000000028e, 0x100, 0x0) 18:35:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x3b000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) keyctl$dh_compute(0x18, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, 0x0, 0x0) [ 762.833497] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:54 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x3c, 0x0) 18:35:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x47, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x18, 0x0, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) getsockname(r2, &(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003a80)={@local, @multicast2, 0x0}, &(0x7f0000003ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000007a00)={@initdev, 0x0}, &(0x7f0000007a40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007b80)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000007bc0)={0x0, @multicast1, @local}, &(0x7f0000007c00)=0xc) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) accept$packet(0xffffffffffffffff, &(0x7f0000008000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008040)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000080c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000008100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008140)=0x14, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008300)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000008400)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000008440)={@multicast1, @broadcast, 0x0}, &(0x7f0000008480)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000084c0)={0x0, @rand_addr, @remote}, &(0x7f0000008500)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000009740)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000009840)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f000000a2c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f000000a280)={&(0x7f0000009880)={0x9c8, r4, 0x0, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r5}, {0xf8, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x254, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1d7}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}]}}, {{0x8, 0x1, r17}, {0x1ac, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xc5d4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r18}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r20}}, {0x8}}}]}}, {{0x8, 0x1, r21}, {0x134, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x57d5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffff0000}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}]}}, {{0x8, 0x1, r24}, {0x230, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r27}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r28}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}]}}, {{0x8, 0x1, r30}, {0x128, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r32}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x7fff, 0x9, 0xfff, 0x8661}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}]}}]}, 0x9c8}, 0x1, 0x0, 0x0, 0x880}, 0x4000) 18:35:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, 0x0, 0x0) 18:35:54 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 18:35:54 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x16, 0x0) 18:35:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x657dd799e4c79b2b, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x18, 0x0, 0x0, 0x0, 0x0) 18:35:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, 0x0, 0x0) 18:35:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) getsockname(r2, &(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003a80)={@local, @multicast2, 0x0}, &(0x7f0000003ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000007a00)={@initdev, 0x0}, &(0x7f0000007a40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007b80)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000007bc0)={0x0, @multicast1, @local}, &(0x7f0000007c00)=0xc) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) accept$packet(0xffffffffffffffff, &(0x7f0000008000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008040)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000080c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000008100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008140)=0x14, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008300)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000008400)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000008440)={@multicast1, @broadcast, 0x0}, &(0x7f0000008480)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000084c0)={0x0, @rand_addr, @remote}, &(0x7f0000008500)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000009740)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000009840)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f000000a2c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f000000a280)={&(0x7f0000009880)={0x9c8, r4, 0x0, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r5}, {0xf8, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x254, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1d7}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}]}}, {{0x8, 0x1, r17}, {0x1ac, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xc5d4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r18}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r20}}, {0x8}}}]}}, {{0x8, 0x1, r21}, {0x134, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x57d5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffff0000}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}]}}, {{0x8, 0x1, r24}, {0x230, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r27}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r28}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}]}}, {{0x8, 0x1, r30}, {0x128, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r32}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x7fff, 0x9, 0xfff, 0x8661}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}]}}]}, 0x9c8}, 0x1, 0x0, 0x0, 0x880}, 0x4000) 18:35:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x10, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:54 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x14b, 0x0) 18:35:54 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1fb, 0x0) [ 763.796649] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x6bc55d7d013e4d87, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) getsockname(r2, &(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003a80)={@local, @multicast2, 0x0}, &(0x7f0000003ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000007a00)={@initdev, 0x0}, &(0x7f0000007a40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007b80)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000007bc0)={0x0, @multicast1, @local}, &(0x7f0000007c00)=0xc) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) accept$packet(0xffffffffffffffff, &(0x7f0000008000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008040)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000080c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000008100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008140)=0x14, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008300)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000008400)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000008440)={@multicast1, @broadcast, 0x0}, &(0x7f0000008480)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000084c0)={0x0, @rand_addr, @remote}, &(0x7f0000008500)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000009740)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000009840)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f000000a2c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f000000a280)={&(0x7f0000009880)={0x9c8, r4, 0x0, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r5}, {0xf8, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x254, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1d7}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}]}}, {{0x8, 0x1, r17}, {0x1ac, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xc5d4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r18}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r20}}, {0x8}}}]}}, {{0x8, 0x1, r21}, {0x134, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x57d5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffff0000}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}]}}, {{0x8, 0x1, r24}, {0x230, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r27}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r28}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}]}}, {{0x8, 0x1, r30}, {0x128, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r32}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x7fff, 0x9, 0xfff, 0x8661}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}]}}]}, 0x9c8}, 0x1, 0x0, 0x0, 0x880}, 0x4000) 18:35:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x5d19d90b00000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:55 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) tkill(r2, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 18:35:55 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x137, 0x0) 18:35:55 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x14b, 0x0) 18:35:55 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x12c, 0x0) 18:35:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xc0e1, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003a80)={@local, @multicast2}, &(0x7f0000003ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000007a00)={@initdev}, &(0x7f0000007a40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007b80)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000007bc0)={0x0, @multicast1, @local}, &(0x7f0000007c00)=0xc) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) accept$packet(0xffffffffffffffff, &(0x7f0000008000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008040)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000080c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000008100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008140)=0x14, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008300)={{{@in=@loopback}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000008400)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000008440)={@multicast1, @broadcast}, &(0x7f0000008480)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000084c0)={0x0, @rand_addr, @remote}, &(0x7f0000008500)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000009740)={{{@in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000009840)=0xe8) [ 764.365613] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:55 executing program 3 (fault-call:3 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:35:55 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x14b, 0x0) 18:35:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x1200, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:55 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x181, 0x0) 18:35:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003a80)={@local, @multicast2}, &(0x7f0000003ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000007a00)={@initdev}, &(0x7f0000007a40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007b80)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000007bc0)={0x0, @multicast1, @local}, &(0x7f0000007c00)=0xc) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) accept$packet(0xffffffffffffffff, &(0x7f0000008000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008040)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000080c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000008100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008140)=0x14, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008300)={{{@in=@loopback}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000008400)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000008440)={@multicast1, @broadcast}, &(0x7f0000008480)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000084c0)={0x0, @rand_addr, @remote}, &(0x7f0000008500)=0xc) [ 764.657522] FAULT_INJECTION: forcing a failure. [ 764.657522] name failslab, interval 1, probability 0, space 0, times 0 [ 764.740070] CPU: 1 PID: 26759 Comm: syz-executor3 Not tainted 4.20.0+ #176 [ 764.747134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.756488] Call Trace: [ 764.759090] dump_stack+0x1d3/0x2c6 [ 764.762743] ? dump_stack_print_info.cold.1+0x20/0x20 [ 764.767975] should_fail.cold.4+0xa/0x17 [ 764.772062] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 764.777177] ? rcu_read_unlock_special+0x370/0x370 [ 764.782123] ? sock_has_perm+0x2bc/0x3e0 [ 764.786202] ? __fget+0x4d1/0x740 [ 764.789762] ? find_held_lock+0x36/0x1c0 [ 764.793854] ? ___might_sleep+0x1ed/0x300 [ 764.798013] ? arch_local_save_flags+0x40/0x40 [ 764.802609] ? arch_local_save_flags+0x40/0x40 [ 764.807202] ? lock_downgrade+0x900/0x900 [ 764.811369] __should_failslab+0x124/0x180 [ 764.815621] should_failslab+0x9/0x14 [ 764.819432] kmem_cache_alloc_trace+0x2db/0x750 [ 764.824125] aead_bind+0x51/0x160 [ 764.827597] alg_bind+0x2be/0x560 [ 764.831061] ? security_socket_bind+0x94/0xc0 [ 764.835575] __sys_bind+0x331/0x440 [ 764.839214] ? __ia32_sys_socketpair+0xf0/0xf0 [ 764.843811] ? __sb_end_write+0xd9/0x110 [ 764.847892] ? trace_hardirqs_on+0xbd/0x310 [ 764.852215] ? __ia32_sys_read+0xb0/0xb0 [ 764.856292] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.861665] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 764.867137] __x64_sys_bind+0x73/0xb0 [ 764.870962] do_syscall_64+0x1b9/0x820 [ 764.874864] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 764.880239] ? syscall_return_slowpath+0x5e0/0x5e0 [ 764.885175] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 764.890028] ? trace_hardirqs_on_caller+0x310/0x310 [ 764.895058] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 764.900087] ? prepare_exit_to_usermode+0x291/0x3b0 [ 764.905122] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 764.909981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.915177] RIP: 0033:0x457ec9 [ 764.918378] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:35:56 executing program 5 (fault-call:2 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x18, 0x0, 0x0, 0x0, 0x0) [ 764.937284] RSP: 002b:00007fc53aec8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 764.945008] RAX: ffffffffffffffda RBX: 00007fc53aec8c90 RCX: 0000000000457ec9 [ 764.952280] RDX: 0000000000000058 RSI: 0000000020000000 RDI: 0000000000000003 [ 764.959724] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 764.966998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc53aec96d4 [ 764.974275] R13: 00000000004bdf0a R14: 00000000004cdd80 R15: 0000000000000005 18:35:58 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) tkill(r2, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 18:35:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003a80)={@local, @multicast2}, &(0x7f0000003ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000007a00)={@initdev}, &(0x7f0000007a40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007b80)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000007bc0)={0x0, @multicast1, @local}, &(0x7f0000007c00)=0xc) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) accept$packet(0xffffffffffffffff, &(0x7f0000008000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008040)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000080c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000008100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008140)=0x14, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008300)={{{@in=@loopback}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000008400)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000008440)={@multicast1, @broadcast}, &(0x7f0000008480)=0xc) 18:35:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x2600, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:35:58 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1da, 0x0) 18:35:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x18, 0x0, 0x0, 0x0, 0x0) 18:35:58 executing program 3 (fault-call:3 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) [ 767.548966] FAULT_INJECTION: forcing a failure. [ 767.548966] name failslab, interval 1, probability 0, space 0, times 0 [ 767.592449] CPU: 0 PID: 26789 Comm: syz-executor3 Not tainted 4.20.0+ #176 [ 767.599492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.608851] Call Trace: [ 767.611454] dump_stack+0x1d3/0x2c6 [ 767.615103] ? dump_stack_print_info.cold.1+0x20/0x20 [ 767.620308] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 767.625592] ? graph_lock+0x270/0x270 [ 767.629425] should_fail.cold.4+0xa/0x17 [ 767.633510] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 767.638637] ? crypto_alg_lookup+0x73/0x1d0 [ 767.642972] ? lock_downgrade+0x900/0x900 [ 767.647134] ? find_held_lock+0x36/0x1c0 [ 767.651236] ? ___might_sleep+0x1ed/0x300 [ 767.655403] ? arch_local_save_flags+0x40/0x40 [ 767.655422] ? __crypto_alg_lookup+0x31b/0x390 [ 767.655452] __should_failslab+0x124/0x180 [ 767.655471] should_failslab+0x9/0x14 [ 767.664626] __kmalloc+0x2e4/0x760 [ 767.664643] ? crypto_larval_alloc+0x1d0/0x1d0 [ 767.664662] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 767.664681] ? crypto_create_tfm+0x87/0x310 [ 767.664702] crypto_create_tfm+0x87/0x310 [ 767.694804] crypto_alloc_tfm+0x1b5/0x2d0 [ 767.698984] crypto_alloc_aead+0x2c/0x40 [ 767.703060] aead_bind+0x70/0x160 [ 767.706529] alg_bind+0x2be/0x560 [ 767.709995] ? security_socket_bind+0x94/0xc0 [ 767.714512] __sys_bind+0x331/0x440 [ 767.718154] ? __ia32_sys_socketpair+0xf0/0xf0 [ 767.722762] ? __sb_end_write+0xd9/0x110 [ 767.726845] ? trace_hardirqs_on+0xbd/0x310 [ 767.731175] ? __ia32_sys_read+0xb0/0xb0 [ 767.735258] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 18:35:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0xb, 0x0, 0x0, 0x0, 0x0) 18:35:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003a80)={@local, @multicast2}, &(0x7f0000003ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000007a00)={@initdev}, &(0x7f0000007a40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007b80)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000007bc0)={0x0, @multicast1, @local}, &(0x7f0000007c00)=0xc) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) accept$packet(0xffffffffffffffff, &(0x7f0000008000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008040)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000080c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000008100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008140)=0x14, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008300)={{{@in=@loopback}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000008400)=0xe8) 18:35:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x13, 0x0, 0x0, 0x0, 0x0) [ 767.740627] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 767.746101] __x64_sys_bind+0x73/0xb0 [ 767.749913] do_syscall_64+0x1b9/0x820 [ 767.753824] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 767.759200] ? syscall_return_slowpath+0x5e0/0x5e0 [ 767.764147] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 767.769004] ? trace_hardirqs_on_caller+0x310/0x310 [ 767.774035] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 767.774055] ? prepare_exit_to_usermode+0x291/0x3b0 [ 767.774077] ? trace_hardirqs_off_thunk+0x1a/0x1c 18:35:58 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xee, 0x0) [ 767.784106] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.784120] RIP: 0033:0x457ec9 [ 767.784137] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 767.816219] RSP: 002b:00007fc53aec8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 767.816236] RAX: ffffffffffffffda RBX: 00007fc53aec8c90 RCX: 0000000000457ec9 [ 767.816245] RDX: 0000000000000058 RSI: 0000000020000000 RDI: 0000000000000003 18:35:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x2fd9f69af9c288c, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 767.816255] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 767.816268] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc53aec96d4 [ 767.853025] R13: 00000000004bdf0a R14: 00000000004cdd80 R15: 0000000000000005 [ 767.888740] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:35:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x15, 0x0, 0x0, 0x0, 0x0) 18:36:01 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) tkill(r2, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 18:36:01 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x6e, 0x0) 18:36:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003a80)={@local, @multicast2}, &(0x7f0000003ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000007a00)={@initdev}, &(0x7f0000007a40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007b80)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000007bc0)={0x0, @multicast1, @local}, &(0x7f0000007c00)=0xc) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) accept$packet(0xffffffffffffffff, &(0x7f0000008000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008040)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000080c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000008100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008140)=0x14, 0x80800) 18:36:01 executing program 3 (fault-call:3 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:36:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0xa, 0x0, 0x0, 0x0, 0x0) 18:36:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x10, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 770.752657] FAULT_INJECTION: forcing a failure. [ 770.752657] name failslab, interval 1, probability 0, space 0, times 0 18:36:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x9000000180000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003a80)={@local, @multicast2}, &(0x7f0000003ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000007a00)={@initdev}, &(0x7f0000007a40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007b80)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000007bc0)={0x0, @multicast1, @local}, &(0x7f0000007c00)=0xc) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) accept$packet(0xffffffffffffffff, &(0x7f0000008000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008040)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000080c0)=0x14) [ 770.812478] CPU: 0 PID: 26833 Comm: syz-executor3 Not tainted 4.20.0+ #176 [ 770.819539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.828893] Call Trace: [ 770.831506] dump_stack+0x1d3/0x2c6 [ 770.835150] ? dump_stack_print_info.cold.1+0x20/0x20 [ 770.840367] ? rcu_read_unlock_special+0x370/0x370 [ 770.845320] should_fail.cold.4+0xa/0x17 [ 770.849393] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 770.854505] ? kernel_text_address+0x79/0xf0 [ 770.858937] ? __kernel_text_address+0xd/0x40 [ 770.863464] ? graph_lock+0x270/0x270 [ 770.867282] ? find_held_lock+0x36/0x1c0 [ 770.867315] ? ___might_sleep+0x1ed/0x300 [ 770.875507] ? arch_local_save_flags+0x40/0x40 [ 770.880108] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 770.885576] __should_failslab+0x124/0x180 [ 770.889828] should_failslab+0x9/0x14 [ 770.889844] __kmalloc+0x2e4/0x760 [ 770.889860] ? up_read+0x225/0x2c0 [ 770.889875] ? down_read+0x8d/0x120 [ 770.889891] ? up_read_non_owner+0x100/0x100 [ 770.889911] ? crypto_create_tfm+0x87/0x310 [ 770.913197] crypto_create_tfm+0x87/0x310 [ 770.917374] crypto_spawn_tfm2+0x6f/0xc0 [ 770.921520] crypto_ccm_init_tfm+0x43/0x250 [ 770.925856] ? crypto_ccm_setkey+0x2e0/0x2e0 [ 770.930280] crypto_aead_init_tfm+0x147/0x1b0 [ 770.934792] crypto_create_tfm+0xe9/0x310 [ 770.938967] crypto_alloc_tfm+0x1b5/0x2d0 [ 770.943136] crypto_alloc_aead+0x2c/0x40 [ 770.947212] aead_bind+0x70/0x160 [ 770.950678] alg_bind+0x2be/0x560 [ 770.954140] ? security_socket_bind+0x94/0xc0 [ 770.958883] __sys_bind+0x331/0x440 18:36:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003a80)={@local, @multicast2}, &(0x7f0000003ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000007a00)={@initdev}, &(0x7f0000007a40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007b80)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000007bc0)={0x0, @multicast1, @local}, &(0x7f0000007c00)=0xc) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) accept$packet(0xffffffffffffffff, &(0x7f0000008000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008040)=0x14) [ 770.962528] ? __ia32_sys_socketpair+0xf0/0xf0 [ 770.967131] ? __sb_end_write+0xd9/0x110 [ 770.971221] ? trace_hardirqs_on+0xbd/0x310 [ 770.975559] ? __ia32_sys_read+0xb0/0xb0 [ 770.979685] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.985100] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 770.990581] __x64_sys_bind+0x73/0xb0 [ 770.994402] do_syscall_64+0x1b9/0x820 [ 770.998302] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 771.003682] ? syscall_return_slowpath+0x5e0/0x5e0 [ 771.008639] ? trace_hardirqs_off_thunk+0x1a/0x1c 18:36:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003a80)={@local, @multicast2}, &(0x7f0000003ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000007a00)={@initdev}, &(0x7f0000007a40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007b80)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000007bc0)={0x0, @multicast1, @local}, &(0x7f0000007c00)=0xc) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) [ 771.013511] ? trace_hardirqs_on_caller+0x310/0x310 [ 771.018571] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 771.023603] ? prepare_exit_to_usermode+0x291/0x3b0 [ 771.028639] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 771.033510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.038703] RIP: 0033:0x457ec9 [ 771.041903] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:36:02 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x120, 0x0) 18:36:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x6, 0x0, 0x0, 0x0, 0x0) [ 771.060818] RSP: 002b:00007fc53aec8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 771.060838] RAX: ffffffffffffffda RBX: 00007fc53aec8c90 RCX: 0000000000457ec9 [ 771.060847] RDX: 0000000000000058 RSI: 0000000020000000 RDI: 0000000000000003 [ 771.060860] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 771.083089] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc53aec96d4 [ 771.083100] R13: 00000000004bdf0a R14: 00000000004cdd80 R15: 0000000000000005 18:36:05 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 18:36:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x8c28f4a7699f3ffd, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003a80)={@local, @multicast2}, &(0x7f0000003ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000007a00)={@initdev}, &(0x7f0000007a40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007b80)=0x14) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:05 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x91, 0x0) 18:36:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x8, 0x0, 0x0, 0x0, 0x0) 18:36:05 executing program 3 (fault-call:3 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) [ 773.971919] FAULT_INJECTION: forcing a failure. [ 773.971919] name failslab, interval 1, probability 0, space 0, times 0 [ 774.024488] CPU: 1 PID: 26880 Comm: syz-executor3 Not tainted 4.20.0+ #176 [ 774.031551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.031558] Call Trace: [ 774.031584] dump_stack+0x1d3/0x2c6 [ 774.031607] ? dump_stack_print_info.cold.1+0x20/0x20 [ 774.043702] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 774.047190] ? rcu_read_unlock_special+0x370/0x370 [ 774.047207] ? rcu_softirq_qs+0x20/0x20 [ 774.047234] should_fail.cold.4+0xa/0x17 [ 774.047258] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 774.047278] ? __kernel_text_address+0xd/0x40 [ 774.047297] ? unwind_get_return_address+0x61/0xa0 [ 774.090762] ? find_held_lock+0x36/0x1c0 [ 774.094856] ? ___might_sleep+0x1ed/0x300 [ 774.099016] ? arch_local_save_flags+0x40/0x40 [ 774.103625] __should_failslab+0x124/0x180 [ 774.107873] should_failslab+0x9/0x14 [ 774.111682] __kmalloc+0x2e4/0x760 [ 774.115247] ? crypto_create_tfm+0x87/0x310 [ 774.119589] crypto_create_tfm+0x87/0x310 [ 774.123760] crypto_init_shash_ops_async+0x5d/0x3e4 [ 774.128792] crypto_ahash_init_tfm+0x357/0x430 [ 774.133391] crypto_create_tfm+0xe9/0x310 [ 774.137556] crypto_spawn_tfm2+0x6f/0xc0 [ 774.141631] crypto_ccm_init_tfm+0x43/0x250 [ 774.145978] ? crypto_ccm_setkey+0x2e0/0x2e0 [ 774.150406] crypto_aead_init_tfm+0x147/0x1b0 [ 774.154917] crypto_create_tfm+0xe9/0x310 [ 774.159094] crypto_alloc_tfm+0x1b5/0x2d0 [ 774.163260] crypto_alloc_aead+0x2c/0x40 [ 774.167449] aead_bind+0x70/0x160 [ 774.170917] alg_bind+0x2be/0x560 18:36:05 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xce, 0x0) 18:36:05 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1f7, 0x0) [ 774.174392] ? security_socket_bind+0x94/0xc0 [ 774.178907] __sys_bind+0x331/0x440 [ 774.182552] ? __ia32_sys_socketpair+0xf0/0xf0 [ 774.187157] ? __sb_end_write+0xd9/0x110 [ 774.191242] ? trace_hardirqs_on+0xbd/0x310 [ 774.195576] ? __ia32_sys_read+0xb0/0xb0 [ 774.199650] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.205026] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 774.210493] __x64_sys_bind+0x73/0xb0 [ 774.214306] do_syscall_64+0x1b9/0x820 [ 774.218206] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 774.223580] ? syscall_return_slowpath+0x5e0/0x5e0 [ 774.228521] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 774.233371] ? trace_hardirqs_on_caller+0x310/0x310 [ 774.238394] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 774.243421] ? prepare_exit_to_usermode+0x291/0x3b0 [ 774.248464] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 774.253325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.258523] RIP: 0033:0x457ec9 18:36:05 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x77, 0x0) 18:36:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003a80)={@local, @multicast2}, &(0x7f0000003ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000007a00)={@initdev}, &(0x7f0000007a40)=0x14) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x2, 0x0, 0x0, 0x0, 0x0) 18:36:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x2700000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 774.261730] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 774.280667] RSP: 002b:00007fc53aec8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 774.288421] RAX: ffffffffffffffda RBX: 00007fc53aec8c90 RCX: 0000000000457ec9 [ 774.295712] RDX: 0000000000000058 RSI: 0000000020000000 RDI: 0000000000000003 [ 774.302985] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 774.310258] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc53aec96d4 [ 774.317534] R13: 00000000004bdf0a R14: 00000000004cdd80 R15: 0000000000000005 18:36:06 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(0x0, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 18:36:06 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x94, 0x0) 18:36:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x11, 0x0, 0x0, 0x0, 0x0) 18:36:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003a80)={@local, @multicast2}, &(0x7f0000003ac0)=0xc) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x37000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:06 executing program 3 (fault-call:3 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) [ 774.928329] FAULT_INJECTION: forcing a failure. [ 774.928329] name failslab, interval 1, probability 0, space 0, times 0 [ 774.976356] CPU: 0 PID: 26918 Comm: syz-executor3 Not tainted 4.20.0+ #176 [ 774.983406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.992765] Call Trace: [ 774.995386] dump_stack+0x1d3/0x2c6 [ 774.999037] ? dump_stack_print_info.cold.1+0x20/0x20 [ 775.004258] ? unwind_dump+0x190/0x190 [ 775.008177] should_fail.cold.4+0xa/0x17 [ 775.012261] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 775.017377] ? unwind_get_return_address+0x61/0xa0 [ 775.022317] ? __save_stack_trace+0x8d/0xf0 [ 775.026656] ? graph_lock+0x270/0x270 [ 775.030474] ? save_stack+0xa9/0xd0 [ 775.034110] ? find_held_lock+0x36/0x1c0 [ 775.038191] ? ___might_sleep+0x1ed/0x300 [ 775.042389] ? arch_local_save_flags+0x40/0x40 [ 775.046988] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 775.052452] __should_failslab+0x124/0x180 [ 775.056699] should_failslab+0x9/0x14 [ 775.060505] __kmalloc+0x2e4/0x760 [ 775.064052] ? up_read+0x225/0x2c0 [ 775.067594] ? down_read+0x8d/0x120 [ 775.071233] ? up_read_non_owner+0x100/0x100 [ 775.075650] ? __crypto_alloc_tfm+0xd7/0x540 [ 775.080068] __crypto_alloc_tfm+0xd7/0x540 [ 775.084319] crypto_spawn_tfm+0x92/0xe0 [ 775.088311] ? crypto_rfc4309_exit_tfm+0x40/0x40 [ 775.093072] cbcmac_init_tfm+0x46/0xc0 [ 775.096984] crypto_create_tfm+0x184/0x310 [ 775.101239] crypto_init_shash_ops_async+0x5d/0x3e4 [ 775.101290] crypto_ahash_init_tfm+0x357/0x430 [ 775.101311] crypto_create_tfm+0xe9/0x310 [ 775.101333] crypto_spawn_tfm2+0x6f/0xc0 [ 775.101349] crypto_ccm_init_tfm+0x43/0x250 [ 775.101365] ? crypto_ccm_setkey+0x2e0/0x2e0 [ 775.127853] crypto_aead_init_tfm+0x147/0x1b0 [ 775.132362] crypto_create_tfm+0xe9/0x310 [ 775.136522] crypto_alloc_tfm+0x1b5/0x2d0 [ 775.140687] crypto_alloc_aead+0x2c/0x40 [ 775.144759] aead_bind+0x70/0x160 [ 775.148232] alg_bind+0x2be/0x560 [ 775.151703] ? security_socket_bind+0x94/0xc0 [ 775.156222] __sys_bind+0x331/0x440 [ 775.159895] ? __ia32_sys_socketpair+0xf0/0xf0 [ 775.164489] ? __sb_end_write+0xd9/0x110 [ 775.168580] ? trace_hardirqs_on+0xbd/0x310 [ 775.172906] ? __ia32_sys_read+0xb0/0xb0 [ 775.176988] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.182358] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 775.187822] __x64_sys_bind+0x73/0xb0 [ 775.191632] do_syscall_64+0x1b9/0x820 [ 775.195530] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 775.200903] ? syscall_return_slowpath+0x5e0/0x5e0 [ 775.205860] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 775.210730] ? trace_hardirqs_on_caller+0x310/0x310 [ 775.215755] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 775.220783] ? prepare_exit_to_usermode+0x291/0x3b0 [ 775.225815] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 775.230674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.235865] RIP: 0033:0x457ec9 [ 775.239063] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 775.257972] RSP: 002b:00007fc53aec8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 775.265680] RAX: ffffffffffffffda RBX: 00007fc53aec8c90 RCX: 0000000000457ec9 18:36:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x5500, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0xe, 0x0, 0x0, 0x0, 0x0) 18:36:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:06 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x5, 0x0) 18:36:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x6a00, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 775.272973] RDX: 0000000000000058 RSI: 0000000020000000 RDI: 0000000000000003 [ 775.280251] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 775.287529] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc53aec96d4 [ 775.294802] R13: 00000000004bdf0a R14: 00000000004cdd80 R15: 0000000000000005 [ 775.303566] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:36:06 executing program 3 (fault-call:3 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) [ 775.605752] FAULT_INJECTION: forcing a failure. [ 775.605752] name failslab, interval 1, probability 0, space 0, times 0 [ 775.628618] CPU: 0 PID: 26954 Comm: syz-executor3 Not tainted 4.20.0+ #176 [ 775.635675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.645023] Call Trace: [ 775.647619] dump_stack+0x1d3/0x2c6 [ 775.651241] ? dump_stack_print_info.cold.1+0x20/0x20 [ 775.656428] ? crypto_init_shash_ops_async+0x5d/0x3e4 [ 775.661601] ? crypto_ahash_init_tfm+0x357/0x430 [ 775.666344] ? crypto_create_tfm+0xe9/0x310 [ 775.670675] ? crypto_spawn_tfm2+0x6f/0xc0 [ 775.674896] ? crypto_aead_init_tfm+0x147/0x1b0 [ 775.679562] should_fail.cold.4+0xa/0x17 [ 775.683637] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 775.688752] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.694276] ? graph_lock+0x270/0x270 [ 775.698066] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 775.703592] ? find_held_lock+0x36/0x1c0 [ 775.707677] ? ___might_sleep+0x1ed/0x300 [ 775.711831] ? arch_local_save_flags+0x40/0x40 [ 775.716402] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 775.721841] __should_failslab+0x124/0x180 [ 775.726080] should_failslab+0x9/0x14 [ 775.729911] __kmalloc+0x2e4/0x760 [ 775.733462] ? up_read+0x225/0x2c0 [ 775.736991] ? down_read+0x8d/0x120 [ 775.740618] ? up_read_non_owner+0x100/0x100 [ 775.745049] ? crypto_create_tfm+0x87/0x310 [ 775.749373] crypto_create_tfm+0x87/0x310 [ 775.753509] crypto_spawn_tfm2+0x6f/0xc0 [ 775.757568] crypto_ccm_init_tfm+0x89/0x250 [ 775.761902] ? crypto_ccm_setkey+0x2e0/0x2e0 [ 775.766309] crypto_aead_init_tfm+0x147/0x1b0 [ 775.770790] crypto_create_tfm+0xe9/0x310 [ 775.774927] crypto_alloc_tfm+0x1b5/0x2d0 [ 775.779090] crypto_alloc_aead+0x2c/0x40 [ 775.783158] aead_bind+0x70/0x160 [ 775.786592] alg_bind+0x2be/0x560 [ 775.790033] ? security_socket_bind+0x94/0xc0 [ 775.794516] __sys_bind+0x331/0x440 [ 775.798128] ? __ia32_sys_socketpair+0xf0/0xf0 [ 775.802702] ? __sb_end_write+0xd9/0x110 [ 775.806759] ? trace_hardirqs_on+0xbd/0x310 [ 775.811063] ? __ia32_sys_read+0xb0/0xb0 [ 775.815110] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.820459] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 775.825896] __x64_sys_bind+0x73/0xb0 [ 775.829687] do_syscall_64+0x1b9/0x820 [ 775.833561] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 775.838908] ? syscall_return_slowpath+0x5e0/0x5e0 [ 775.843829] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 775.848656] ? trace_hardirqs_on_caller+0x310/0x310 [ 775.853661] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 775.858662] ? prepare_exit_to_usermode+0x291/0x3b0 [ 775.863667] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 775.868510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.873696] RIP: 0033:0x457ec9 [ 775.876876] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 775.895810] RSP: 002b:00007fc53aec8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 775.903517] RAX: ffffffffffffffda RBX: 00007fc53aec8c90 RCX: 0000000000457ec9 [ 775.910771] RDX: 0000000000000058 RSI: 0000000020000000 RDI: 0000000000000003 [ 775.918025] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 775.925281] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc53aec96d4 [ 775.932535] R13: 00000000004bdf0a R14: 00000000004cdd80 R15: 0000000000000005 18:36:07 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 18:36:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x9, 0x0, 0x0, 0x0, 0x0) 18:36:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xf5e8154834000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000038c0)={0x0, @loopback, @broadcast}, &(0x7f0000003900)=0xc) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:07 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xb2, 0x0) 18:36:07 executing program 3 (fault-call:3 fault-nth:6): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) [ 776.061844] FAULT_INJECTION: forcing a failure. [ 776.061844] name failslab, interval 1, probability 0, space 0, times 0 [ 776.149821] CPU: 1 PID: 26962 Comm: syz-executor3 Not tainted 4.20.0+ #176 [ 776.156890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.166266] Call Trace: [ 776.168875] dump_stack+0x1d3/0x2c6 [ 776.172521] ? dump_stack_print_info.cold.1+0x20/0x20 [ 776.177744] should_fail.cold.4+0xa/0x17 [ 776.181824] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 776.186985] ? __save_stack_trace+0x8d/0xf0 [ 776.191326] ? save_stack+0xa9/0xd0 [ 776.194976] ? find_held_lock+0x36/0x1c0 [ 776.199063] ? ___might_sleep+0x1ed/0x300 [ 776.203221] ? arch_local_save_flags+0x40/0x40 [ 776.207815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.213370] __should_failslab+0x124/0x180 [ 776.217615] should_failslab+0x9/0x14 [ 776.221419] __kmalloc+0x2e4/0x760 [ 776.223594] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 776.224977] ? __crypto_alloc_tfm+0xd7/0x540 [ 776.225001] __crypto_alloc_tfm+0xd7/0x540 [ 776.225024] crypto_skcipher_init_tfm+0x2cf/0x8d0 [ 776.225043] crypto_create_tfm+0xe9/0x310 [ 776.252952] crypto_spawn_tfm2+0x6f/0xc0 [ 776.257027] crypto_ccm_init_tfm+0x89/0x250 [ 776.261355] ? crypto_ccm_setkey+0x2e0/0x2e0 [ 776.265771] crypto_aead_init_tfm+0x147/0x1b0 [ 776.270282] crypto_create_tfm+0xe9/0x310 [ 776.274443] crypto_alloc_tfm+0x1b5/0x2d0 [ 776.278604] crypto_alloc_aead+0x2c/0x40 [ 776.282716] aead_bind+0x70/0x160 [ 776.286180] alg_bind+0x2be/0x560 [ 776.289645] ? security_socket_bind+0x94/0xc0 [ 776.294157] __sys_bind+0x331/0x440 [ 776.297794] ? __ia32_sys_socketpair+0xf0/0xf0 [ 776.302397] ? __sb_end_write+0xd9/0x110 [ 776.306484] ? trace_hardirqs_on+0xbd/0x310 [ 776.310807] ? __ia32_sys_read+0xb0/0xb0 [ 776.314878] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.320255] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 776.325740] __x64_sys_bind+0x73/0xb0 [ 776.329551] do_syscall_64+0x1b9/0x820 [ 776.333449] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 776.338824] ? syscall_return_slowpath+0x5e0/0x5e0 [ 776.343772] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 776.348622] ? trace_hardirqs_on_caller+0x310/0x310 [ 776.353649] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 776.358674] ? prepare_exit_to_usermode+0x291/0x3b0 [ 776.363717] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 776.368581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.373776] RIP: 0033:0x457ec9 [ 776.376975] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:36:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xb00000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000036c0)={'team0\x00'}) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0xd, 0x0, 0x0, 0x0, 0x0) [ 776.395888] RSP: 002b:00007fc53aec8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 776.403614] RAX: ffffffffffffffda RBX: 00007fc53aec8c90 RCX: 0000000000457ec9 [ 776.410903] RDX: 0000000000000058 RSI: 0000000020000000 RDI: 0000000000000003 [ 776.418202] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 776.425494] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc53aec96d4 [ 776.432773] R13: 00000000004bdf0a R14: 00000000004cdd80 R15: 0000000000000005 18:36:07 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x12d, 0x0) 18:36:07 executing program 3 (fault-call:3 fault-nth:7): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:36:07 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 18:36:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x15be3f404e83dd8d, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x10, 0x0, 0x0, 0x0, 0x0) 18:36:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@empty}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003680)=0xe8) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) [ 776.827844] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 776.838157] FAULT_INJECTION: forcing a failure. [ 776.838157] name failslab, interval 1, probability 0, space 0, times 0 [ 776.858304] CPU: 1 PID: 27002 Comm: syz-executor3 Not tainted 4.20.0+ #176 [ 776.865374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.874742] Call Trace: [ 776.877352] dump_stack+0x1d3/0x2c6 [ 776.881007] ? dump_stack_print_info.cold.1+0x20/0x20 [ 776.886240] ? unwind_dump+0x190/0x190 [ 776.890157] should_fail.cold.4+0xa/0x17 [ 776.894235] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 776.899350] ? unwind_get_return_address+0x61/0xa0 [ 776.904299] ? graph_lock+0x270/0x270 [ 776.908124] ? save_stack+0xa9/0xd0 [ 776.911766] ? find_held_lock+0x36/0x1c0 [ 776.915858] ? ___might_sleep+0x1ed/0x300 [ 776.920015] ? arch_local_save_flags+0x40/0x40 [ 776.924615] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 776.930094] __should_failslab+0x124/0x180 [ 776.934351] should_failslab+0x9/0x14 [ 776.938167] __kmalloc+0x2e4/0x760 [ 776.941770] ? up_read+0x225/0x2c0 [ 776.945413] ? down_read+0x8d/0x120 [ 776.949063] ? up_read_non_owner+0x100/0x100 [ 776.953494] ? __crypto_alloc_tfm+0xd7/0x540 [ 776.958255] __crypto_alloc_tfm+0xd7/0x540 [ 776.962515] crypto_spawn_tfm+0x92/0xe0 [ 776.966518] ? crypto_rfc3686_exit_tfm+0x40/0x40 [ 776.971293] crypto_ctr_init_tfm+0x46/0xc0 [ 776.975552] __crypto_alloc_tfm+0x353/0x540 [ 776.979901] crypto_skcipher_init_tfm+0x2cf/0x8d0 [ 776.984778] crypto_create_tfm+0xe9/0x310 [ 776.988955] crypto_spawn_tfm2+0x6f/0xc0 [ 776.993031] crypto_ccm_init_tfm+0x89/0x250 [ 776.997364] ? crypto_ccm_setkey+0x2e0/0x2e0 [ 777.001784] crypto_aead_init_tfm+0x147/0x1b0 [ 777.006296] crypto_create_tfm+0xe9/0x310 [ 777.010465] crypto_alloc_tfm+0x1b5/0x2d0 [ 777.014636] crypto_alloc_aead+0x2c/0x40 [ 777.018716] aead_bind+0x70/0x160 [ 777.022183] alg_bind+0x2be/0x560 [ 777.025646] ? security_socket_bind+0x94/0xc0 [ 777.030161] __sys_bind+0x331/0x440 [ 777.033805] ? __ia32_sys_socketpair+0xf0/0xf0 [ 777.038409] ? __sb_end_write+0xd9/0x110 [ 777.042498] ? trace_hardirqs_on+0xbd/0x310 [ 777.046832] ? __ia32_sys_read+0xb0/0xb0 [ 777.050906] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.056294] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 777.061769] __x64_sys_bind+0x73/0xb0 [ 777.065585] do_syscall_64+0x1b9/0x820 [ 777.069487] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 777.074871] ? syscall_return_slowpath+0x5e0/0x5e0 [ 777.079816] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 777.084675] ? trace_hardirqs_on_caller+0x310/0x310 [ 777.089712] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 777.094725] ? prepare_exit_to_usermode+0x291/0x3b0 [ 777.099807] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 777.104649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.109827] RIP: 0033:0x457ec9 18:36:08 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1f6, 0x0) 18:36:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x35000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x19, 0x0, 0x0, 0x0, 0x0) [ 777.113021] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 777.131927] RSP: 002b:00007fc53aec8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 777.139640] RAX: ffffffffffffffda RBX: 00007fc53aec8c90 RCX: 0000000000457ec9 [ 777.146904] RDX: 0000000000000058 RSI: 0000000020000000 RDI: 0000000000000003 [ 777.154172] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 777.161452] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc53aec96d4 [ 777.168740] R13: 00000000004bdf0a R14: 00000000004cdd80 R15: 0000000000000005 18:36:08 executing program 3 (fault-call:3 fault-nth:8): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:36:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'vcan0\x00'}) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x32000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x5, 0x0, 0x0, 0x0, 0x0) 18:36:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003500)=0xe8) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) [ 777.558896] FAULT_INJECTION: forcing a failure. [ 777.558896] name failslab, interval 1, probability 0, space 0, times 0 [ 777.607562] CPU: 0 PID: 27039 Comm: syz-executor3 Not tainted 4.20.0+ #176 [ 777.614630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.623995] Call Trace: [ 777.626601] dump_stack+0x1d3/0x2c6 [ 777.630254] ? dump_stack_print_info.cold.1+0x20/0x20 [ 777.635473] ? graph_lock+0x270/0x270 [ 777.639294] should_fail.cold.4+0xa/0x17 [ 777.643371] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 777.648498] ? graph_lock+0x270/0x270 [ 777.652313] ? crypto_alg_lookup+0x73/0x1d0 [ 777.656644] ? lock_downgrade+0x900/0x900 [ 777.660803] ? find_held_lock+0x36/0x1c0 [ 777.664881] ? __lock_is_held+0xb5/0x140 [ 777.668975] ? ___might_sleep+0x1ed/0x300 [ 777.673150] ? arch_local_save_flags+0x40/0x40 [ 777.677757] ? __crypto_alg_lookup+0x31b/0x390 [ 777.682372] __should_failslab+0x124/0x180 [ 777.686631] should_failslab+0x9/0x14 [ 777.690440] __kmalloc+0x2e4/0x760 [ 777.693995] ? crypto_larval_alloc+0x1d0/0x1d0 [ 777.698589] ? crypto_spawn_tfm2+0x8f/0xc0 [ 777.702838] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 777.708392] ? crypto_ccm_init_tfm+0x6b/0x250 [ 777.712902] ? crypto_create_tfm+0x87/0x310 [ 777.717253] ? crypto_ccm_setkey+0x2e0/0x2e0 [ 777.717289] crypto_create_tfm+0x87/0x310 [ 777.717310] crypto_alloc_tfm+0x1b5/0x2d0 [ 777.725869] ? crypto_alloc_tfm+0x193/0x2d0 [ 777.725893] crypto_alloc_sync_skcipher+0x2d/0xd0 [ 777.725913] crypto_get_default_null_skcipher+0x5c/0x90 [ 777.744582] aead_bind+0x95/0x160 [ 777.748055] alg_bind+0x2be/0x560 [ 777.751524] ? security_socket_bind+0x94/0xc0 [ 777.756041] __sys_bind+0x331/0x440 [ 777.759682] ? __ia32_sys_socketpair+0xf0/0xf0 [ 777.764289] ? __sb_end_write+0xd9/0x110 [ 777.768378] ? trace_hardirqs_on+0xbd/0x310 [ 777.772706] ? __ia32_sys_read+0xb0/0xb0 [ 777.776772] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.782140] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 777.782165] __x64_sys_bind+0x73/0xb0 [ 777.782186] do_syscall_64+0x1b9/0x820 [ 777.782202] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 777.782229] ? syscall_return_slowpath+0x5e0/0x5e0 [ 777.782247] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 777.810469] ? trace_hardirqs_on_caller+0x310/0x310 [ 777.815498] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 777.820529] ? prepare_exit_to_usermode+0x291/0x3b0 [ 777.825558] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 777.830418] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.835618] RIP: 0033:0x457ec9 [ 777.838824] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:36:09 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r1, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 18:36:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x12, 0x0, 0x0, 0x0, 0x0) 18:36:09 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1b8, 0x0) 18:36:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x7000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) [ 777.857726] RSP: 002b:00007fc53aec8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 777.865426] RAX: ffffffffffffffda RBX: 00007fc53aec8c90 RCX: 0000000000457ec9 [ 777.872683] RDX: 0000000000000058 RSI: 0000000020000000 RDI: 0000000000000003 [ 777.879951] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 777.887211] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc53aec96d4 [ 777.894552] R13: 00000000004bdf0a R14: 00000000004cdd80 R15: 0000000000000005 18:36:09 executing program 3 (fault-call:3 fault-nth:9): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:36:09 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x2f, 0x0) 18:36:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x4, 0x0, 0x0, 0x0, 0x0) 18:36:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x3200, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 778.141316] FAULT_INJECTION: forcing a failure. [ 778.141316] name failslab, interval 1, probability 0, space 0, times 0 [ 778.261187] CPU: 1 PID: 27063 Comm: syz-executor3 Not tainted 4.20.0+ #176 [ 778.268251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.277609] Call Trace: [ 778.280218] dump_stack+0x1d3/0x2c6 [ 778.283865] ? dump_stack_print_info.cold.1+0x20/0x20 [ 778.289088] should_fail.cold.4+0xa/0x17 [ 778.293174] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 778.298291] ? __save_stack_trace+0x8d/0xf0 [ 778.302635] ? graph_lock+0x270/0x270 [ 778.306448] ? save_stack+0xa9/0xd0 18:36:09 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x12b, 0x0) [ 778.310094] ? find_held_lock+0x36/0x1c0 [ 778.314168] ? __lock_is_held+0xb5/0x140 [ 778.318248] ? ___might_sleep+0x1ed/0x300 [ 778.322402] ? arch_local_save_flags+0x40/0x40 [ 778.326998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.332553] __should_failslab+0x124/0x180 [ 778.336803] should_failslab+0x9/0x14 [ 778.340613] __kmalloc+0x2e4/0x760 [ 778.340638] ? __crypto_alloc_tfm+0xd7/0x540 [ 778.340661] __crypto_alloc_tfm+0xd7/0x540 [ 778.340682] crypto_skcipher_init_tfm+0x2cf/0x8d0 [ 778.340712] crypto_create_tfm+0xe9/0x310 [ 778.348674] crypto_alloc_tfm+0x1b5/0x2d0 [ 778.365994] ? crypto_alloc_tfm+0x193/0x2d0 [ 778.370336] crypto_alloc_sync_skcipher+0x2d/0xd0 [ 778.375197] crypto_get_default_null_skcipher+0x5c/0x90 [ 778.380575] aead_bind+0x95/0x160 [ 778.384037] alg_bind+0x2be/0x560 [ 778.387508] ? security_socket_bind+0x94/0xc0 [ 778.392022] __sys_bind+0x331/0x440 [ 778.395666] ? __ia32_sys_socketpair+0xf0/0xf0 [ 778.400274] ? __sb_end_write+0xd9/0x110 [ 778.404360] ? trace_hardirqs_on+0xbd/0x310 [ 778.408689] ? __ia32_sys_read+0xb0/0xb0 [ 778.412767] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.418143] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 778.423609] __x64_sys_bind+0x73/0xb0 [ 778.427425] do_syscall_64+0x1b9/0x820 [ 778.431324] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 778.436696] ? syscall_return_slowpath+0x5e0/0x5e0 [ 778.441639] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 778.446491] ? trace_hardirqs_on_caller+0x310/0x310 [ 778.451521] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 778.456552] ? prepare_exit_to_usermode+0x291/0x3b0 18:36:09 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x182, 0x0) [ 778.461585] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 778.466495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.471689] RIP: 0033:0x457ec9 [ 778.474892] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 778.493797] RSP: 002b:00007fc53aec8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 778.501513] RAX: ffffffffffffffda RBX: 00007fc53aec8c90 RCX: 0000000000457ec9 18:36:09 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 18:36:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x790000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 778.508789] RDX: 0000000000000058 RSI: 0000000020000000 RDI: 0000000000000003 [ 778.516067] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 778.523340] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc53aec96d4 [ 778.530612] R13: 00000000004bdf0a R14: 00000000004cdd80 R15: 0000000000000005 18:36:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'ipddp0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0xc, 0x0, 0x0, 0x0, 0x0) 18:36:09 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x55, 0x0) [ 778.687664] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:36:09 executing program 3 (fault-call:3 fault-nth:10): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:36:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x25, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'sit0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:10 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xa5, 0x0) 18:36:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x1c, 0x0, 0x0, 0x0, 0x0) 18:36:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:36:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x4a00000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:10 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 18:36:10 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1d8, 0x0) 18:36:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x2, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:36:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x1b, 0x0, 0x0, 0x0, 0x0) 18:36:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0xc426, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x62000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x7, 0x0, 0x0, 0x0, 0x0) [ 779.696148] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:36:10 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x6d, 0x0) 18:36:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x16, 0x0, 0x0, 0x0, 0x0) 18:36:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r2, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockname(r1, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r2, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:11 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 18:36:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x12000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aea\xfe\xff\xff\xff\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:36:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockname(r1, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r1, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:11 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x13e, 0x0) 18:36:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0xf, 0x0, 0x0, 0x0, 0x0) 18:36:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x1d, 0x0, 0x0, 0x0, 0x0) 18:36:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x80\x01\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:36:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x1a00, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) [ 780.261488] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:36:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r1, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:11 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x10c, 0x0) 18:36:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r1, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:11 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 18:36:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00\x00\x00\x00\x00\x00\x01\x80\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:36:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x2700, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x3, 0x0, 0x0, 0x0, 0x0) 18:36:11 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x6c, 0x0) 18:36:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r1, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:36:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) 18:36:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r1, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:12 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x1dd, 0x0) 18:36:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x59, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00\x00\x01\x80\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:36:12 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) listen(r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 18:36:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000004440)=[{&(0x7f0000004340)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r1, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x14, 0x0, 0x0, 0x0, 0x0) 18:36:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x4000000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r1, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00\x00\x02\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:36:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x18, 0x0, 0x0, 0x7ffffffff000, 0x0) 18:36:12 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 18:36:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r1, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:12 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x5e, 0x0) 18:36:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x3c00000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x18, 0x0, 0x0, 0x7fffffffefff, 0x0) 18:36:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x02\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) [ 781.675065] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:36:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r1, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x18, 0x0, 0x0, 0x740000, 0x0) 18:36:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00\x00\x00\x00\x00\x00\x00\x01\x80\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:36:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x60be55e4bbb500, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:13 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0xb, 0x0) 18:36:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r1, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) [ 782.066799] kasan: CONFIG_KASAN_INLINE enabled [ 782.100600] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 782.108060] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 782.114303] CPU: 0 PID: 27334 Comm: syz-executor5 Not tainted 4.20.0+ #176 [ 782.121317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.130694] RIP: 0010:keyctl_pkey_params_get+0x2e7/0x560 [ 782.136154] Code: fe 48 8b 44 24 38 48 c1 e8 03 42 80 3c 28 00 0f 85 f8 01 00 00 4c 8b a4 24 e0 00 00 00 4c 89 e0 4c 89 e2 48 c1 e8 03 83 e2 07 <42> 0f b6 04 28 38 d0 7f 08 84 c0 0f 85 e1 01 00 00 41 0f b6 04 24 [ 782.155059] RSP: 0018:ffff88804f8afb70 EFLAGS: 00010246 [ 782.160436] RAX: 1846259a13bafa20 RBX: ffff88804f8afd60 RCX: ffffc9000fe9d000 [ 782.164111] kobject: 'loop1' (000000006bce0eaf): kobject_uevent_env [ 782.167701] RDX: 0000000000000000 RSI: ffffffff8344323e RDI: 0000000000000001 [ 782.167710] RBP: ffff88804f8afce0 R08: ffff8880899b4380 R09: ffffed1012e515f0 [ 782.167719] R10: ffffed1012e515f0 R11: 0000000000000002 R12: c2312cd09dd7d100 [ 782.167728] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 [ 782.167741] FS: 00007f3f8275b700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 782.167753] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 782.185867] kobject: 'loop1' (000000006bce0eaf): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 782.188789] CR2: 000000000073c000 CR3: 00000000a177f000 CR4: 00000000001426f0 [ 782.188802] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 782.188811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 782.188816] Call Trace: [ 782.188843] ? __keyctl_dh_compute.cold.5+0x71/0x71 [ 782.223599] kobject: 'loop2' (0000000070b30414): kobject_uevent_env [ 782.226871] ? arch_local_save_flags+0x40/0x40 [ 782.226890] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 782.226911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.256774] kobject: 'loop2' (0000000070b30414): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 782.262690] keyctl_pkey_query+0xb8/0x2b0 [ 782.262708] ? keyctl_pkey_params_get_2+0x580/0x580 [ 782.262725] ? do_syscall_64+0x9a/0x820 [ 782.262740] ? do_syscall_64+0x9a/0x820 [ 782.262754] ? lockdep_hardirqs_on+0x421/0x5c0 [ 782.262774] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.314834] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 782.320292] __x64_sys_keyctl+0x15f/0x430 [ 782.323732] kobject: 'loop3' (00000000eab67ee0): kobject_uevent_env [ 782.324448] do_syscall_64+0x1b9/0x820 [ 782.324466] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 782.324484] ? syscall_return_slowpath+0x5e0/0x5e0 [ 782.334667] kobject: 'loop3' (00000000eab67ee0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 782.334761] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 782.359294] ? trace_hardirqs_on_caller+0x310/0x310 [ 782.364310] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 782.369313] ? prepare_exit_to_usermode+0x291/0x3b0 [ 782.374322] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 782.379156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.384326] RIP: 0033:0x457ec9 [ 782.387507] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 782.406418] RSP: 002b:00007f3f8275ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 782.414122] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457ec9 [ 782.421381] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000018 [ 782.428637] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 782.435901] R10: 0000000000740000 R11: 0000000000000246 R12: 00007f3f8275b6d4 [ 782.443150] R13: 00000000004c36ec R14: 00000000004d5ee0 R15: 00000000ffffffff [ 782.450416] Modules linked in: [ 782.454293] ---[ end trace b35890d8ef8bbbc4 ]--- [ 782.459143] RIP: 0010:keyctl_pkey_params_get+0x2e7/0x560 [ 782.466409] Code: fe 48 8b 44 24 38 48 c1 e8 03 42 80 3c 28 00 0f 85 f8 01 00 00 4c 8b a4 24 e0 00 00 00 4c 89 e0 4c 89 e2 48 c1 e8 03 83 e2 07 <42> 0f b6 04 28 38 d0 7f 08 84 c0 0f 85 e1 01 00 00 41 0f b6 04 24 [ 782.492922] RSP: 0018:ffff88804f8afb70 EFLAGS: 00010246 18:36:13 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) syz_open_dev$mice(&(0x7f0000001580)='/dev/input/mice\x00', 0x0, 0x480000) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) perf_event_open(&(0x7f0000000500)={0x7, 0xffffffffffffffae, 0x0, 0xceaf, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r0, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r1, 0x401104000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 18:36:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x1400000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 18:36:13 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x154, 0x0) 18:36:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) 18:36:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) [ 782.500358] RAX: 1846259a13bafa20 RBX: ffff88804f8afd60 RCX: ffffc9000fe9d000 [ 782.501506] kobject: 'loop0' (00000000d23b8f3a): kobject_uevent_env [ 782.507649] RDX: 0000000000000000 RSI: ffffffff8344323e RDI: 0000000000000001 [ 782.556630] kobject: 'loop0' (00000000d23b8f3a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 782.564844] RBP: ffff88804f8afce0 R08: ffff8880899b4380 R09: ffffed1012e515f0 18:36:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00\x00\x00\x01\x80\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) 18:36:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) recvmsg(r1, &(0x7f0000007fc0)={&(0x7f0000007c40)=@can, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007cc0)=""/65, 0x41}, {&(0x7f0000007d40)=""/194, 0xc2}, {&(0x7f0000007e40)=""/242, 0xf2}], 0x3, &(0x7f0000007f80)=""/29, 0x1d}, 0x100) [ 782.618416] R10: ffffed1012e515f0 R11: 0000000000000002 R12: c2312cd09dd7d100 [ 782.628174] kobject: 'loop3' (00000000eab67ee0): kobject_uevent_env [ 782.635878] kobject: 'loop3' (00000000eab67ee0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 782.651820] kobject: 'loop2' (0000000070b30414): kobject_uevent_env [ 782.662769] kobject: 'loop2' (0000000070b30414): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 782.670679] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 [ 782.691700] FS: 00007f3f8275b700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 782.693534] kobject: 'loop1' (000000006bce0eaf): kobject_uevent_env [ 782.705055] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 782.713065] CR2: 00000000004da8a8 CR3: 00000000a177f000 CR4: 00000000001426f0 [ 782.731291] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 782.731303] kobject: 'loop1' (000000006bce0eaf): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 782.736396] kobject: 'loop4' (00000000a0defc76): kobject_uevent_env [ 782.757346] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 782.774996] kobject: 'loop4' (00000000a0defc76): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 782.780260] Kernel panic - not syncing: Fatal exception [ 782.790828] Kernel Offset: disabled [ 782.794451] Rebooting in 86400 seconds..